Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.
References
Configurations
Information
Published : 2007-12-07 03:46
Updated : 2018-10-03 14:51
NVD link : CVE-2007-6109
Mitre link : CVE-2007-6109
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnu
- emacs