First published: Fri Jul 22 2016(Updated: )
Integer signedness error in bspatch.c in bspatch in bsdiff, as used in Apple OS X before 10.11.6 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted patch file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bsdiff | 4.3-21 4.3-22 4.3-23 | |
ubuntu/bsdiff | <4.3-17 | 4.3-17 |
ubuntu/bsdiff | <4.3-15+ | 4.3-15+ |
macOS Yosemite | <=10.11.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9862 has a high severity rating due to its potential to allow remote code execution or denial of service.
To fix CVE-2014-9862, update bsdiff to versions 4.3-21, 4.3-22, or 4.3-23 on Debian, or version 4.3-17 on Ubuntu.
CVE-2014-9862 affects Apple OS X versions prior to 10.11.6 and various versions of the bsdiff software.
Exploitation of CVE-2014-9862 can lead to arbitrary code execution or result in a heap-based buffer overflow.
Remote attackers with access to a crafted patch file can exploit CVE-2014-9862.