Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
References
Configurations
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html - | |
References | () http://seclists.org/oss-sec/2014/q4/539 - Exploit | |
References | () http://seclists.org/oss-sec/2014/q4/551 - | |
References | () http://seclists.org/oss-sec/2014/q4/622 - | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485 - Exploit | |
References | () https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98551 - |
Information
Published : 2015-01-20 15:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8625
Mitre link : CVE-2014-8625
CVE.ORG link : CVE-2014-8625
JSON object : View
Products Affected
debian
- dpkg
CWE
CWE-134
Use of Externally-Controlled Format String