Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-27347

Опубликовано: 30 окт. 2020
Источник: redhat
CVSS3: 8.5

Описание

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

Отчет

tmux as shipped with Red Hat Enterprise Linux of any version is not affected because the vulnerable code exists in newer versions of tmux than those shipped.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7tmuxNot affected
Red Hat Enterprise Linux 8tmuxNot affected
Red Hat Enterprise Linux 9tmuxNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1893339tmux: stack buffer overflow in input_csi_dispatch_sgr_colon

8.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 5 лет назад

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

CVSS3: 8.8
nvd
больше 5 лет назад

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

CVSS3: 8.8
debian
больше 5 лет назад

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon( ...

CVSS3: 7.8
github
больше 3 лет назад

The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

suse-cvrf
больше 5 лет назад

Security update for tmux

8.5 High

CVSS3