Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-27347

Опубликовано: 06 нояб. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6
CVSS3: 8.8

Описание

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

released

3.0a-2ubuntu0.2
esm-infra/xenial

not-affected

code not present
focal

released

3.0a-2ubuntu0.2
groovy

released

3.1b-1ubuntu0.1
precise/esm

not-affected

trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 49%
0.00262
Низкий

4.6 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.5
redhat
больше 5 лет назад

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

CVSS3: 8.8
nvd
больше 5 лет назад

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

CVSS3: 8.8
debian
больше 5 лет назад

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon( ...

CVSS3: 7.8
github
больше 3 лет назад

The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

suse-cvrf
больше 5 лет назад

Security update for tmux

EPSS

Процентиль: 49%
0.00262
Низкий

4.6 Medium

CVSS2

8.8 High

CVSS3