First published: Tue Apr 14 2015(Updated: )
The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
GNU less | <=471 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9488 has a moderate severity level as it allows for potential out-of-bounds reads which can be exploited by attackers.
To fix CVE-2014-9488, upgrade GNU less to version 475 or later.
GNU less versions prior to 475, specifically up to 471, are affected by CVE-2014-9488.
CVE-2014-9488 impacts openSUSE versions 13.1 and 13.2 along with affected GNU less versions.
Exploiting CVE-2014-9488 can lead to unexpected behavior and may disclose sensitive information due to the out-of-bounds read.