First published: Thu Sep 04 2008(Updated: )
Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU ed | =0.3 | |
GNU ed | =0.7 | |
GNU ed | =0.6 | |
GNU ed | =0.4 | |
GNU ed | =0.2 | |
GNU ed | =0.9 | |
GNU ed | =0.5 | |
GNU ed | =0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.