VMware Security Advisory - A heap-based buffer overflow was discovered in the way ed, the GNU line editor, processed long file names. An attacker could create a file with a specially-crafted name that could possibly execute an arbitrary code when opened in the ed editor.
e543e4b89812eead2fd7b1d444b7c2ef8891ecc6969a7a5e7ee04258d84bc0f0
Gentoo Linux Security Advisory GLSA 200809-15 - A buffer overflow vulnerability in ed may allow for the remote execution of arbitrary code. Alfredo Ortega from Core Security Technologies reported a heap-based buffer overflow in the strip_escapes() function when processing overly long filenames. Versions less than 1.0 are affected.
f6a5e1e2246ef38a36e01eb57598f52f6671c42e718aa7b1a7bf7f17ea90cd42
Mandriva Linux Security Advisory - A heap-based buffer overflow was found in GNU ed that allowed context-dependent or user-assisted attackers to execute arbitrary code via a long filename. This update provides GNU ed 1.0, which is not vulnerable to this issue.
de708e796cf8394c907a39bc1c5a3f97809b4055f65e1283087d9efc333cbcc4