Bug 415751 (CVE-2007-6109) - CVE-2007-6109 Emacs buffer overflows
Summary: CVE-2007-6109 Emacs buffer overflows
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2007-6109
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-12-07 15:56 UTC by Lubomir Kundrak
Modified: 2021-11-12 19:46 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-12-07 16:01:25 UTC
Embargoed:


Attachments (Terms of Use)
Patch used by SuSE (3.24 KB, patch)
2007-12-10 10:13 UTC, Tomas Hoger
no flags Details | Diff

Description Lubomir Kundrak 2007-12-07 15:56:31 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-6109 to the following vulnerability:

Buffer overflow in emacs allows attackers to have an unknown impact, as demonstrated via a vector involving the command line.

References:

http://www.novell.com/linux/security/advisories/2007_25_sr.html

Comment 1 Lubomir Kundrak 2007-12-07 16:01:25 UTC
To exploit this the user would have to be convinced to run an untrusted el script.

Red Hat does not consider this issue to be a security vulnerability since no
trust boundary is crossed. The user must voluntarily interact with the attack
mechanism to exploit this flaw, with the result being the ability to run code as
themselves.

Comment 5 Tomas Hoger 2007-12-10 10:13:26 UTC
Created attachment 282581 [details]
Patch used by SuSE


Note You need to log in before you can comment on or make changes to this bug.