Description
Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.
CVSS vector
AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0 Affected Packages2 packages
🔴Vulnerability Details
3GHSAGHSA-j55v-8789-5phj: Heap-based buffer overflow in the strip_escapes function in signal↗2022-05-02 ▶ OSVCVE-2008-3916: Heap-based buffer overflow in the strip_escapes function in signal↗2008-09-04 ▶ CVEListCVE-2008-3916: Heap-based buffer overflow in the strip_escapes function in signal↗2008-09-04 ▶ 📋Vendor Advisories
2Red Hated: Heap-based buffer overflow (arb. code execution)↗2008-06-30 ▶ DebianCVE-2008-3916: ed - Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed b...↗2008 ▶ 💬Community
4BugzillaCVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution) [F9]↗2008-10-08 ▶ BugzillaCVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution) [Fdevel]↗2008-10-08 ▶ BugzillaCVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution) [F8]↗2008-10-08 ▶ BugzillaCVE-2008-3916 ed: Heap-based buffer overflow (arb. code execution)↗2008-09-17 ▶