Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 1 Sep 2008 07:05:54 +0000
From: Tavis Ormandy <taviso@....lonestar.org>
To: oss-security@...ts.openwall.com
Subject: Re: GNU ed heap overflow

If you can specify an arbitrary filename, can't you execute commands
anyway?

$ ed '!ls>&2'
bin   dev  home  lost+found  misc  net  proc  sbin     srv  tmp  var
boot  etc  lib   media       mnt   opt  root  selinux  sys  usr
0

Thanks, Tavis.

On Sun, Aug 31, 2008 at 01:13:01PM +0200, Florian Weimer wrote:
> Can we get a CVE for this?  The overflow is in the command line
> processing, and also affects the red command.
> 
> | Alfredo Ortega from Core Security Technologies has found that GNU Ed
> | is vulnerable to a heap overflow.
> 
> <http://lists.gnu.org/archive/html/bug-ed/2008-06/msg00000.html>

-- 
-------------------------------------
taviso@....lonestar.org | finger me for my gpg key.
-------------------------------------------------------

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.