CVE-2014-8625
 
Severity Score
6.8
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
Múltiples vulnerabilidades de cadenas de formatos en la función parse_error_msg en parsehelp.c en dpkg anterior a 1.17.22 permiten a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de especificadores de cadenas de formatos en el nombre (1) del paquete o (2) de la arquitectura.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-11-06 CVE Reserved
- 2015-01-20 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2024-09-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-134: Use of Externally-Controlled Format String
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://seclists.org/oss-sec/2014/q4/551 | Mailing List | |
http://seclists.org/oss-sec/2014/q4/622 | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98551 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://seclists.org/oss-sec/2014/q4/539 | 2024-08-06 | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485 | 2024-08-06 | |
https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html | 2017-09-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Debian Search vendor "Debian" | Dpkg Search vendor "Debian" for product "Dpkg" | <= 1.17.21 Search vendor "Debian" for product "Dpkg" and version " <= 1.17.21" | - |
Affected
|