Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0946

Опубликовано: 21 окт. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0946: ed security update (MODERATE)

[0.2-39]

  • add fix for CVE-2008-3916

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

ed

0.2-39.el5_2

Oracle Linux x86_64

ed

0.2-39.el5_2

Oracle Linux i386

ed

0.2-39.el5_2

Связанные CVE

Связанные уязвимости

ubuntu
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

redhat
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

nvd
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

debian
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c i ...

github
около 3 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.