CVE-2022-45939 In GNU Emacs through 28.2, attackers can execute commands in the name of a source-code file because lib-src/etags.c uses the system C library function.
This may lead to ctags parsing arbitrary shell metacharacters to determine the location of the source code, potentially leading to code execution. lib-src/etags.c does not limit the characters that may be used in the source code location.
5.5 - Multiple Vulnerabilities in GNU Emacs through 28.2 allow remote attackers to cause a denial of service (OOM) and possibly execute arbitrary code via a crafted image-file-name property value.
An attacker may leverage the fact that the lib-src/imagemag.c function parses the file name of an XWD image file to determine the source code location.
5.6 stack-buffer-limit - GNU Emacs through 28.2, when running with the --with-features=ssp configuration option, allows remote attackers to cause a denial of service (OOM) via a large number of recursive call frames (CVE-2018-14090).
5.7 - GNU Emacs through 28.2 updates the value of the variable inhibit-startup-message before the first use of the function get-process-tty-dir.
If this value is updated to a string that is later found to contain malicious code, it may cause the application to enter an infinite loop that eventually results in a denial of service (OOM) (CVE-2018-14091).
5.8 - GNU Emacs through 28
GNU Emacs through 28.5 has multiple vulnerabilities that allow remote attackers to cause a denial of service (OOM) and possibly execute arbitrary code
In GNU Emacs through 28.2, it is possible for an attacker to cause a denial of service (OOM) in lib-src/etags.c via a crafted image-file-name property value. In GNU Emacs through 28.3, lib-src/imagemag.c may be called recursively without bounds checking that could lead to a denial of service (OOM). In GNU Emacs through 28.5, there are multiple vulnerabilities that allow remote attackers to cause a denial of service (OOM) and possibly execute arbitrary code.
GNU Emacs Vulnerabilities
GNU Emacs through 28.2 on Windows does not use the full range of an unsigned 32-bit integer for function calls.
This may lead to a buffer overflow and code execution as a result of reading large buffers (CVE-2018-14092).
^ top ↑
6.1 - Multiple Vulnerabilities in GNU Emacs through 28.2 allow remote attackers to cause a denial of service (OOM) and possibly execute arbitrary code via a crafted image-file-name property value.
An attacker may leverage the fact that the lib-src/imagemag.c function parses the file name of an XWD image file to determine the source code location.
6.2 - stack-buffer-limit - GNU Emacs through 28.2, when running with the --with-features=ssp configuration option, allows remote attackers to cause a denial of service (OOM) via a large number of recursive call frames (CVE-2018-14090).
6.3 - GNU Emacs through 28 updates the value of the variable inhibit-startup-message before the first use of the function get-process-tty-dir.
If this value is updated to a string that is later found to contain malicious code, it may cause the application to enter an infinite loop that eventually results in a denial of service (OOM) (CVE-2018-14091).
Timeline
Published on: 11/28/2022 06:15:00 UTC
Last modified on: 12/01/2022 19:48:00 UTC