GNU ed File Processing 'strip_escapes()' Heap Overflow Vulnerability
BID:30815
Info
GNU ed File Processing 'strip_escapes()' Heap Overflow Vulnerability
| Bugtraq ID: | 30815 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2008-3916 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 21 2008 12:00AM |
| Updated: | Apr 13 2015 09:59PM |
| Credit: | Antonio Diaz Diaz |
| Vulnerable: |
VMWare vMA 4.0 VMWare ESX Server 2.5.5 patch 9 VMWare ESX Server 2.5.5 patch 8 VMWare ESX Server 2.5.5 patch 6 VMWare ESX Server 2.5.5 patch 4 VMWare ESX Server 2.5.5 patch 2 VMWare ESX Server 2.5.5 patch 11 VMWare ESX Server 2.5.5 patch 10 VMWare ESX Server 2.5.5 VMWare ESX Server 4.0 VMWare ESX Server 2.5.5 patch 5 SuSE SUSE Linux Enterprise 11 SP1 SuSE SUSE Linux Enterprise 10 SP3 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux WS 3 Redhat Enterprise Linux WS 2.1 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux ES 3 Redhat Enterprise Linux ES 2.1 Redhat Enterprise Linux Desktop 5 client Redhat Enterprise Linux AS 4 Redhat Enterprise Linux AS 3 Redhat Enterprise Linux AS 2.1 Redhat Enterprise Linux 5 Server Redhat Desktop 4.0 Redhat Desktop 3.0 Redhat Advanced Workstation for the Itanium Processor 2.1 Pardus Linux 2008 0 Pardus Linux 2007 0 Mandriva Linux Mandrake 2008.1 x86_64 Mandriva Linux Mandrake 2008.1 Mandriva Linux Mandrake 2008.0 x86_64 Mandriva Linux Mandrake 2008.0 Mandriva Linux Mandrake 2007.1 x86_64 Mandriva Linux Mandrake 2007.1 MandrakeSoft Corporate Server 4.0 x86_64 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 MandrakeSoft Corporate Server 4.0 GNU Ed 0.9 GNU Ed 0.8 GNU Ed 0.7 GNU Ed 0.6 GNU Ed 0.5 GNU Ed 0.4 GNU Ed 0.3 GNU Ed 0.2 Gentoo Linux Avaya Voice Portal 4.1 Avaya Voice Portal 4.0 Avaya Voice Portal 3.0 Avaya Proactive Contact 4.0 Avaya Proactive Contact 3.0 Avaya Proactive Contact 0 Avaya Messaging Storage Server MM3.0 Avaya Messaging Storage Server 4.0 Avaya Messaging Storage Server 3.1 Avaya Messaging Storage Server 2.0 Avaya Messaging Storage Server 1.0 Avaya Messaging Storage Server Avaya Message Networking MN 3.1 Avaya Message Networking 3.1 Avaya Message Networking Avaya Meeting Exchange - Enterprise Edition Avaya Meeting Exchange 5.0 .0.52 Avaya Meeting Exchange 5.0 Avaya Intuity AUDIX LX 2.0 Avaya EMMC 1.021 Avaya EMMC 1.017 Avaya EMMC 0 Avaya Communication Manager 4.0.3 SP1 Avaya Communication Manager 3.1.4 SP2 Avaya Communication Manager 2.0.1 Avaya Communication Manager 2.0 Avaya Communication Manager 1.3.1 Avaya Communication Manager 1.1 Avaya Communication Manager 5.1 Avaya Communication Manager 5.0 SP3 Avaya Communication Manager 5.0 Avaya Communication Manager 4.0 Avaya Communication Manager 3.1 Avaya Communication Manager 3.0 Avaya Communication Manager 2.2 Avaya Communication Manager 2.1 Avaya Aura SIP Enablement Services 3.1.1 Avaya Aura SIP Enablement Services 5.0 Avaya Aura SIP Enablement Services 3.1 Avaya Aura SIP Enablement Services 3.0 Avaya Aura Application Enablement Services 4.2.1 Avaya Aura Application Enablement Services 4.0.1 Avaya Aura Application Enablement Services 3.1.6 Avaya Aura Application Enablement Services 3.1.5 Avaya Aura Application Enablement Services 3.1.4 Avaya Aura Application Enablement Services 3.1.3 Avaya Aura Application Enablement Services 4.2 Avaya Aura Application Enablement Services 4.1 Avaya Aura Application Enablement Services 4.0 Avaya Aura Application Enablement Services 3.1 Avaya Aura Application Enablement Services 3.0 |
| Not Vulnerable: |
VMWare ESX Server 2.5.5 patch 12 GNU Ed 1.0 |
Discussion
GNU ed File Processing 'strip_escapes()' Heap Overflow Vulnerability
GNU ed is prone to a heap-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input.
Successfully exploiting this issue allows attackers to execute arbitrary code with the privileges of a user running the application. Failed exploit attempts will result in a denial-of-service condition.
Versions prior to GNU ed 1.0 are vulnerable.
GNU ed is prone to a heap-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input.
Successfully exploiting this issue allows attackers to execute arbitrary code with the privileges of a user running the application. Failed exploit attempts will result in a denial-of-service condition.
Versions prior to GNU ed 1.0 are vulnerable.
Exploit / POC
GNU ed File Processing 'strip_escapes()' Heap Overflow Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
GNU ed File Processing 'strip_escapes()' Heap Overflow Vulnerability
Solution:
Updates are available. Please see the references for more information.
Mandriva Linux Mandrake 2008.0 x86_64
Mandriva Linux Mandrake 2008.0
Mandriva Linux Mandrake 2007.1
Mandriva Linux Mandrake 2007.1 x86_64
VMWare ESX Server 2.5.5 patch 5
Mandriva Linux Mandrake 2008.1 x86_64
Mandriva Linux Mandrake 2008.1
MandrakeSoft Corporate Server 4.0
VMWare ESX Server 2.5.5 patch 4
VMWare ESX Server 2.5.5 patch 11
VMWare ESX Server 2.5.5 patch 10
VMWare ESX Server 2.5.5
VMWare ESX Server 2.5.5 patch 9
VMWare ESX Server 2.5.5 patch 8
VMWare ESX Server 2.5.5 patch 6
MandrakeSoft Corporate Server 3.0
MandrakeSoft Corporate Server 3.0 x86_64
Solution:
Updates are available. Please see the references for more information.
Mandriva Linux Mandrake 2008.0 x86_64
-
Mandriva ed-1.0-0.1mdv2008.0.x86_64.rpm
http://www.mandriva.com/en/download/
Mandriva Linux Mandrake 2008.0
-
Mandriva ed-1.0-0.1mdv2008.0.i586.rpm
http://www.mandriva.com/en/download/
Mandriva Linux Mandrake 2007.1
-
Mandriva ed-1.0-0.1mdv2007.1.i586.rpm
http://www.mandriva.com/en/download/
Mandriva Linux Mandrake 2007.1 x86_64
-
Mandriva ed-1.0-0.1mdv2007.1.x86_64.rpm
http://www.mandriva.com/en/download/
VMWare ESX Server 2.5.5 patch 5
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
Mandriva Linux Mandrake 2008.1 x86_64
-
Mandriva ed-1.0-0.1mdv2008.1.x86_64.rpm
http://www.mandriva.com/en/download/
Mandriva Linux Mandrake 2008.1
-
Mandriva ed-1.0-0.1mdv2008.1.i586.rpm
http://www.mandriva.com/en/download/
MandrakeSoft Corporate Server 4.0
-
Mandriva ed-1.0-0.1.20060mlcs4.i586.rpm
http://www.mandriva.com/en/download/
VMWare ESX Server 2.5.5 patch 4
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
VMWare ESX Server 2.5.5 patch 11
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
VMWare ESX Server 2.5.5 patch 10
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
VMWare ESX Server 2.5.5
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
VMWare ESX Server 2.5.5 patch 9
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
VMWare ESX Server 2.5.5 patch 8
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
VMWare ESX Server 2.5.5 patch 6
-
VMWare esx-2.5.5-142709-upgrade.tar.gz
http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar. gz
MandrakeSoft Corporate Server 3.0
-
Mandriva ed-1.0-0.1.C30mdk.i586.rpm
http://www.mandriva.com/en/download/
MandrakeSoft Corporate Server 3.0 x86_64
-
Mandriva ed-1.0-0.1.C30mdk.x86_64.rpm
http://www.mandriva.com/en/download/
References
GNU ed File Processing 'strip_escapes()' Heap Overflow Vulnerability
References:
References:
- [Bug-ed] GNU Ed heap overflow (GNU)
- GNU ed Homepage (GNU)
- GNU Homepage (GNU)
- VMware Homepage (VMware)
- ASA-2008-461 - ed security update (RHSA-2008-0946) (Avaya)