search menu icon-carat-right cmu-wordmark

CERT Coordination Center

FTE fails to properly validate command line arguments

Vulnerability Note VU#354838

Original Release Date: 2004-04-16 | Last Revised: 2004-04-16

Overview

FTE contains a vulnerability in the processing of command line arguments that could allow an attacker to execute arbitrary code.

Description

FTE is a text editor available for a variety of operating systems. There is a buffer overflow vulnerability in the way FTE performs bounds checking on command line arguments. By supplying an overly long string of characters as a command line argument, a local user could execute arbitrary code on the system with privileges of the FTE process. Typically, FTE is installed with setuid root privileges.

Impact

A local user could execute arbitrary code with privileges of the FTE process.

Solution

Upgrade

Upgrade to the latest version of FTE as specified by your vendor.

Vendor Information

354838
 

Debian Affected

Updated:  April 15, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please refer to Debian Security Advisory DSA 472-1.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Steve Kemp.

This document was written by Damon Morda.

Other Information

CVE IDs: CVE-2003-0648
Severity Metric: 10.69
Date Public: 2004-04-03
Date First Published: 2004-04-16
Date Last Updated: 2004-04-16 13:16 UTC
Document Revision: 9

Sponsored by CISA.