7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.007 Low
EPSS
Percentile
80.0%
Severity: Low
Date : 2017-01-25
CVE-ID : CVE-2017-5357
Package : ed
Type : denial of service
Remote : No
Link : https://security.archlinux.org/AVG-145
The package ed before version 1.14.1-1 is vulnerable to denial of
service.
Upgrade to 1.14.1-1.
The problem has been fixed upstream in version 1.14.1.
None.
A vulnerability was found in GNU ed. An invalid free might occur while
parsing specially crafted commands which will make the application
crash.
A local attacker is able to crash the application by providing
malicious input.
https://lists.gnu.org/archive/html/bug-ed/2017-01/msg00000.html
http://www.openwall.com/lists/oss-security/2017/01/12/5
https://security.archlinux.org/CVE-2017-5357
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.007 Low
EPSS
Percentile
80.0%