Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dpkg | Debian | * | 1.17.21 (including) |
Dpkg | Ubuntu | esm-infra-legacy/trusty | * |
Dpkg | Ubuntu | lucid | * |
Dpkg | Ubuntu | precise | * |
Dpkg | Ubuntu | precise/esm | * |
Dpkg | Ubuntu | trusty | * |
Dpkg | Ubuntu | trusty/esm | * |
Dpkg | Ubuntu | upstream | * |
Dpkg | Ubuntu | utopic | * |