Rapid7 Vulnerability & Exploit Database

RHSA-2005:110: emacs security update

Back to Search

RHSA-2005:110: emacs security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
02/07/2005
Created
07/25/2018
Added
10/28/2005
Modified
07/12/2017

Description

Updated Emacs packages that fix a string format issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team

Emacs is a powerful, customizable, self-documenting, modeless text editor. Max Vozeler discovered several format string vulnerabilities in the movemail utility of Emacs. If a user connects to a malicious POP server, an attacker can execute arbitrary code as the user running emacs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0100 to this issue. Users of Emacs are advised to upgrade to these updated packages, which contain backported patches to correct this issue.

Solution(s)

  • redhat-upgrade-emacs
  • redhat-upgrade-emacs-common
  • redhat-upgrade-emacs-el
  • redhat-upgrade-emacs-leim
  • redhat-upgrade-emacs-nox

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;