GLSA-200809-15 : GNU ed: User-assisted execution of arbitrary code
High Nessus Plugin ID 34273
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200809-15 (GNU ed: User-assisted execution of arbitrary code)
Alfredo Ortega from Core Security Technologies reported a heap-based buffer overflow in the strip_escapes() function when processing overly long filenames.
A remote attacker could entice a user to process specially crafted commands with ed or red, possibly resulting in the execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
SolutionAll GNU ed users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=sys-apps/ed-1.0'