First published: Mon Mar 19 2018(Updated: )
Multiple integer overflows in TrueCrypt 7.1a allow local users to (1) obtain sensitive information via vectors involving a crafted item->OriginalLength value in the MainThreadProc function in EncryptedIoQueue.c or (2) cause a denial of service (memory consumption) via vectors involving large StartingOffset and Length values in the ProcessVolumeDeviceControlIrp function in Ntdriver.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TrueCrypt | =7.1-a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2885 has a severity rating classified as medium due to the potential for denial of service and information disclosure.
The best fix for CVE-2014-2885 is to upgrade to a version of TrueCrypt that does not have the vulnerabilities, although TrueCrypt development has ceased.
CVE-2014-2885 allows for local users to exploit integer overflows for sensitive information disclosure and denial of service through memory consumption.
CVE-2014-2885 affects users of TrueCrypt version 7.1a, particularly those running it on local systems.
CVE-2014-2885 can lead to memory issues that may cause applications to crash or hang, impacting overall system stability.