full-disclosure-uk August 2008 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: [Full-disclosure] [PLSA 2008-34] GNU ed: Hea

[Full-disclosure] [PLSA 2008-34] GNU ed: Heap Overflow

From: Pınar Yanardağ <pinar_at_nospam>
Date: Mon Sep 01 2008 - 01:14:09 GMT
To: pardus-security@pardus.org.tr

Pardus Linux Security Advisory 2008-34 security@pardus.org.tr
Date: 2008-09-01 Severity: 2 Type: Remote


A vulnerability was reported in GNU ed. A remote user can cause arbitrary code to be executed on the target user's system.


A remote user can create a specially crafted file that, when processed by the target user, will trigger a heap overflow and potentially execute arbitrary code on the target system. The code will run with the privileges of the target user.

The vulnerability resides in strip_escapes() in signal.c.

Note: This vulnerability found by Alfredo Ortega from Core Security Technologies.

Affected packages:

   Pardus 2008:
     ed, all before 1.0-9-2
   Pardus 2007:
     ed, all before 1.0-7-8


There are update(s) for ed. You can update them via Package Manager or with a single command from console:

   Pardus 2008:
     pisi up ed

   Pardus 2007:
     pisi up ed


-- Pınar Yanardağ Pardus Security Team http://security.pardus.org.tr _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/