First published: Tue Apr 19 2016(Updated: )
Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Debian | =7.0 | |
Debian | =8.0 | |
xdelta3 | <=3.0.8 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9765 has a high severity rating due to its potential for remote code execution.
To fix CVE-2014-9765, update xdelta3 to version 3.0.9 or later.
CVE-2014-9765 affects xdelta3 versions up to 3.0.8, as well as specific versions of Ubuntu, Debian, and openSUSE.
Yes, CVE-2014-9765 can be exploited remotely if a user processes a crafted input file.
The potential consequences of CVE-2014-9765 include arbitrary code execution, which may lead to system compromise.