CVE-2020-27347
Summary
| CVE | CVE-2020-27347 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-11-06 03:15:00 UTC |
| Updated | 2022-10-18 20:05:00 UTC |
| Description | In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Tmux Project |
Tmux |
All |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES |
CONFIRM |
raw.githubusercontent.com |
|
| Do not write after the end of the array and overwrite the stack when · tmux/tmux@a868bac · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| oss-security - CVE-2020-27347: tmux buffer overflow in escape sequence parser |
MISC |
www.openwall.com |
Exploit, Mailing List, Third Party Advisory |
| tmux: Buffer overflow (GLSA 202011-10) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Sergey Nizovtsev
Legacy QID Mappings
- 296070 Oracle Solaris 11.4 Support Repository Update (SRU) 28.82.3 Missing (CPUOCT2020)
- 500705 Alpine Linux Security Update for tmux
- 504477 Alpine Linux Security Update for tmux
- 670876 EulerOS Security Update for tmux (EulerOS-SA-2020-2537)