CVE-2007-6109
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.
Un desbordamiento de búfer en la región stack de la memoria en emacs, permite a los atacantes asistidos por el usuario causar una denegación de servicio (bloqueo de aplicación) y posiblemente tener otro impacto no especificado por medio de un valor de gran precisión en un especificador de cadena de formato de enteros para la función format, como es demostrado por medio de una determinada línea de comandos "emacs -batch -eval".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-11-23 CVE Reserved
- 2007-12-07 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=200297 | X_refsource_confirm | |
http://docs.info.apple.com/article.html?artnum=307562 | X_refsource_confirm | |
http://secunia.com/advisories/27965 | Third Party Advisory | |
http://secunia.com/advisories/27984 | Third Party Advisory | |
http://secunia.com/advisories/28838 | Third Party Advisory | |
http://secunia.com/advisories/29420 | Third Party Advisory | |
http://secunia.com/advisories/30109 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2008/0924/references | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38904 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|