|
Message-ID: <20080901070554.GA14496@sdf.lonestar.org> Date: Mon, 1 Sep 2008 07:05:54 +0000 From: Tavis Ormandy <taviso@....lonestar.org> To: oss-security@...ts.openwall.com Subject: Re: GNU ed heap overflow If you can specify an arbitrary filename, can't you execute commands anyway? $ ed '!ls>&2' bin dev home lost+found misc net proc sbin srv tmp var boot etc lib media mnt opt root selinux sys usr 0 Thanks, Tavis. On Sun, Aug 31, 2008 at 01:13:01PM +0200, Florian Weimer wrote: > Can we get a CVE for this? The overflow is in the command line > processing, and also affects the red command. > > | Alfredo Ortega from Core Security Technologies has found that GNU Ed > | is vulnerable to a heap overflow. > > <http://lists.gnu.org/archive/html/bug-ed/2008-06/msg00000.html> -- ------------------------------------- taviso@....lonestar.org | finger me for my gpg key. -------------------------------------------------------
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.