Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://seclists.org/oss-sec/2014/q4/551 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98551 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html | vendor advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485 | exploit |
http://seclists.org/oss-sec/2014/q4/539 | exploit mailing list |
https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135 | exploit |
http://seclists.org/oss-sec/2014/q4/622 | mailing list |