{"id":"CVE-2007-6109","details":"Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain \"emacs -batch -eval\" command line.","modified":"2026-04-10T03:39:23.562897Z","published":"2007-12-07T11:46:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/27965"},{"type":"ADVISORY","url":"http://secunia.com/advisories/27984"},{"type":"ADVISORY","url":"http://secunia.com/advisories/28838"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29420"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30109"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200712-03.xml"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:034"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2007_25_sr.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/0924/references"},{"type":"WEB","url":"http://bugs.gentoo.org/show_bug.cgi?id=200297"},{"type":"WEB","url":"http://docs.info.apple.com/article.html?artnum=307562"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38904"},{"type":"WEB","url":"https://usn.ubuntu.com/607-1/"}],"schema_version":"1.7.5"}