CVE Vulnerabilities

CVE-2014-8625

Use of Externally-Controlled Format String

Published: Jan 20, 2015 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
DpkgDebian*1.17.21 (including)
DpkgUbuntuesm-infra-legacy/trusty*
DpkgUbuntulucid*
DpkgUbuntuprecise*
DpkgUbuntuprecise/esm*
DpkgUbuntutrusty*
DpkgUbuntutrusty/esm*
DpkgUbuntuupstream*
DpkgUbuntuutopic*

Potential Mitigations

References