CVE Reference: CVE-2007-6109

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2007-6109

Description:
Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/38904

UBUNTU
  http://www.ubuntulinux.org/support/documentation/usn/usn-607-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
  http://www.novell.com/linux/security/advisories/2007_25_sr.html

SAID
  Secunia Advisory: SA27984
  Secunia Advisory: SA27965
  Secunia Advisory: SA28838
  Secunia Advisory: SA29420
  Secunia Advisory: SA30109

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2008:034

GENTOO
  http://security.gentoo.org/glsa/glsa-200712-03.xml

CONFIRM
  http://docs.info.apple.com/article.html?artnum=307562
  http://bugs.gentoo.org/show_bug.cgi?id=200297

APPLE
  http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html


Return to the previous page.