Vulnerability Details : CVE-2015-0860
Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
Vulnerability category: OverflowExecute code
Products affected by CVE-2015-0860
- cpe:2.3:a:debian:dpkg:1.17.4:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.8:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.6:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.0:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.12:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.11:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.10:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.9:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.7:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.6:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.5:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.4:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.7:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.5:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.8:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.16.15:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.15:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.16:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.23:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.24:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.9:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.10:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.17:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.18:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.25:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.13:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.14:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.21:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.22:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.11:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.12:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.19:*:*:*:*:*:*:*
- cpe:2.3:a:debian:dpkg:1.17.20:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-0860
13.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-0860
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-0860
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-0860
-
https://security.gentoo.org/glsa/201612-07
dpkg: Arbitrary code execution (GLSA 201612-07) — Gentoo security
-
http://www.debian.org/security/2015/dsa-3407
Debian -- Security Information -- DSA-3407-1 dpkgVendor Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798324
#798324 - dpkg-deb: Fix off-by-one write access on versionbuf variable - Debian Bug report logs
-
http://www.ubuntu.com/usn/USN-2820-1
USN-2820-1: dpkg vulnerability | Ubuntu security notices
-
https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/dpkg-deb/extract.c?id=e65aa3db04eb908c9507d5d356a95cedb890814d
404 Not Found
-
https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html
Stack overflows and out of bounds read in dpkg (Debian) | The Fuzzing Project
Jump to