Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-3916

Опубликовано: 04 сент. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 9.3

Описание

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

not-affected

1.4-1
lucid

not-affected

maverick

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 84%
0.02338
Низкий

9.3 Critical

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

nvd
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

debian
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c i ...

github
около 3 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

oracle-oval
больше 16 лет назад

ELSA-2008-0946: ed security update (MODERATE)

EPSS

Процентиль: 84%
0.02338
Низкий

9.3 Critical

CVSS2