search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Buffer-overflow vulnerability in Midnight Commander

Vulnerability Note VU#203203

Original Release Date: 2002-08-06 | Last Revised: 2004-02-06

Overview

The mcedit component of some versions of Midnight Commander contains a buffer-overflow vulnerability.

Description

Midnight Commander is a file manager for open source operating systems, distributed under the GNU General Public License (GPL). In version 4.5.1 of Midnight Commander, the mcedit text editor component contains an unspecified buffer-overflow vulnerability that can be exploited to cause a segmentation fault.

Impact

The complete impact of this vulnerability is not yet known. Local attackers can cause a segmentation fault in mdedit. It may be possible to execute arbitrary code, though this has not been demonstrated or proven.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

None.

Vendor Information

203203
 

Midnight Commander Developers Unknown

Updated:  January 29, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Izik for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

CVE IDs: None
Severity Metric: 0.54
Date Public: 2001-11-12
Date First Published: 2002-08-06
Date Last Updated: 2004-02-06 20:08 UTC
Document Revision: 9

Sponsored by CISA.