Vulnerability Description
A buffer overflow flaw was found in the way minicom before version 2.7.1 handled VT100 escape sequences. A malicious terminal device could potentially use this flaw to crash minicom, or execute arbitrary code in the context of the minicom process.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Minicom Project | Minicom | < 2.7.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2017/04/18/5ExploitMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/97966Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7467Issue Tracking
- https://security.gentoo.org/glsa/201706-13Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/04/18/5ExploitMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/97966Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7467Issue Tracking
- https://security.gentoo.org/glsa/201706-13Third Party Advisory
FAQ
What is CVE-2017-7467?
CVE-2017-7467 is a vulnerability with a CVSS score of 7.0 (HIGH). A buffer overflow flaw was found in the way minicom before version 2.7.1 handled VT100 escape sequences. A malicious terminal device could potentially use this flaw to crash minicom, or execute arbitr...
How severe is CVE-2017-7467?
CVE-2017-7467 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7467?
Check the references section above for vendor advisories and patch information. Affected products include: Minicom Project Minicom.