TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized ROM parameter to the tiemu command-line interface to overflow the stack buffer and overwrite the instruction pointer with malicious addresses.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ticalc
Ticalc texas Instrument Emulator |
|
| Vendors & Products |
Ticalc
Ticalc texas Instrument Emulator |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized ROM parameter to the tiemu command-line interface to overflow the stack buffer and overwrite the instruction pointer with malicious addresses. | |
| Title | TiEmu 3.03-nogdb+dfsg-3 Buffer Overflow via ROM Parameter | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-28T11:58:02.386Z
Updated: 2026-03-28T11:58:02.386Z
Reserved: 2026-03-28T11:32:42.741Z
Link: CVE-2016-20040
No data.
Status : Awaiting Analysis
Published: 2026-03-28T12:15:59.670
Modified: 2026-03-30T13:26:07.647
Link: CVE-2016-20040
No data.
ReportizFlow