Description
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
Published: 2020-11-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-19860 In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
Ubuntu USN Ubuntu USN USN-4618-1 tmux vulnerability
History

No history.

Subscriptions

Tmux Project Tmux
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-09-17T00:20:28.710Z

Reserved: 2020-10-20T00:00:00.000Z

Link: CVE-2020-27347

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-06T03:15:17.137

Modified: 2024-11-21T05:21:02.433

Link: CVE-2020-27347

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-10-30T00:00:00Z

Links: CVE-2020-27347 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses