10
CVSSv2

CVE-2007-6109

Published: 07/12/2007 Updated: 03/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in emacs allows user-assisted malicious users to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu emacs

Vendor Advisories

Debian Bug report logs - #455432 emacs22: CVE-2007-6109 buffer overflow in format function Package: emacs22; Maintainer for emacs22 is Rob Browning <rlb@defaultvalueorg>; Source for emacs22 is src:emacs (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Mon, 10 Dec 2007 01:57:02 UTC Severity: gra ...
It was discovered that Emacs did not account for precision when formatting integers If a user were tricked into opening a specially crafted file, an attacker could cause a denial of service or possibly other unspecified actions This issue does not affect Ubuntu 804 (CVE-2007-6109) ...