CVE Vulnerabilities

CVE-2014-8625

Use of Externally-Controlled Format String

Published: Jan 20, 2015 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW

Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Dpkg Debian * 1.17.21 (including)
Dpkg Ubuntu esm-infra-legacy/trusty *
Dpkg Ubuntu lucid *
Dpkg Ubuntu precise *
Dpkg Ubuntu precise/esm *
Dpkg Ubuntu trusty *
Dpkg Ubuntu trusty/esm *
Dpkg Ubuntu upstream *
Dpkg Ubuntu utopic *

Potential Mitigations

References