Lucene search

K
cvelistCanonicalCVELIST:CVE-2020-27347
HistoryNov 06, 2020 - 2:20 a.m.

CVE-2020-27347 tmux stack buffer overflow in function input_csi_dispatch_sgr_colon

2020-11-0602:20:13
CWE-121
canonical
www.cve.org
7
cve-2020-27347
tmux
buffer overflow
input function
stack-based
terminal output

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

25.4%

In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

CNA Affected

[
  {
    "product": "tmux",
    "vendor": "tmux",
    "versions": [
      {
        "lessThan": "3.1c",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "tmux",
    "vendor": "Ubuntu",
    "versions": [
      {
        "lessThan": "3.1b-1ubuntu0.1",
        "status": "affected",
        "version": "3.1b",
        "versionType": "custom"
      },
      {
        "lessThan": "3.0a-2ubuntu0.2",
        "status": "affected",
        "version": "3.0a",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

25.4%