First published: Thu Sep 04 2008(Updated: )
Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU ed | =0.3 | |
GNU ed | =0.7 | |
GNU ed | =0.6 | |
GNU ed | =0.4 | |
GNU ed | =0.2 | |
GNU ed | =0.9 | |
GNU ed | =0.5 | |
GNU ed | =0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3916 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2008-3916, update GNU ed to version 1.0 or later.
CVE-2008-3916 affects GNU ed versions 0.2 through 0.9.
CVE-2008-3916 is a heap-based buffer overflow vulnerability.
Yes, CVE-2008-3916 can be exploited through malicious filenames supplied by users.