[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

tmux: stack buffer overflow in input_csi_dispatch_sgr_colon (CVE-2020-27347)

ID: oval:org.secpod.oval:def:1801725Date: (C)2020-12-22   (M)2022-10-25
Class: PATCHFamily: unix




An attacker can crash or execute arbitrary code inside tmux server process by writing a special escape sequence to the pane"s pseudo tty. Code execution is proved practical only if tmux address space isn"t fully randomized. So ASLR with PIE will mitigiate this issue but more complex exploits may be theoretically created.

Platform:
Alpine Linux 3.12
Product:
tmux
Reference:
12094
CVE-2020-27347
CVE    1
CVE-2020-27347

© SecPod Technologies