Severity
9.3CRITICAL
EPSS
4.7%
top 10.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4
Latest updateMay 2

Description

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages2 packages

Debianed< 0.7-2+3
NVDgnu/ed8 versions+7

🔴Vulnerability Details

3
GHSA
GHSA-j55v-8789-5phj: Heap-based buffer overflow in the strip_escapes function in signal2022-05-02
OSV
CVE-2008-3916: Heap-based buffer overflow in the strip_escapes function in signal2008-09-04
CVEList
CVE-2008-3916: Heap-based buffer overflow in the strip_escapes function in signal2008-09-04

📋Vendor Advisories

2
Red Hat
ed: Heap-based buffer overflow (arb. code execution)2008-06-30
Debian
CVE-2008-3916: ed - Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed b...2008

💬Community

4
Bugzilla
CVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution) [F9]2008-10-08
Bugzilla
CVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution) [Fdevel]2008-10-08
Bugzilla
CVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution) [F8]2008-10-08
Bugzilla
CVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution)2008-09-17
CVE-2008-3916 (CRITICAL CVSS 9.3) | Heap-based buffer overflow in the s | cvebase.io