First published: Tue Oct 11 2016(Updated: )
A locale string of more than 255 characters passed to uloc_getDisplayName() could overflow a buffer on the stack, leading a crash or, potentially, code execution. Upstream patch: <a href="http://bugs.icu-project.org/trac/changeset/35699">http://bugs.icu-project.org/trac/changeset/35699</a> Upstream issue (private as at 2016-10-11): <a href="http://bugs.icu-project.org/trac/ticket/10891">http://bugs.icu-project.org/trac/ticket/10891</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icu | <54.1 | 54.1 |
ICU (International Components for Unicode) | <54.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9911 is considered a high severity vulnerability due to the potential for code execution or crash.
To fix CVE-2014-9911, update the ICU package to version 54.1 or later.
CVE-2014-9911 affects versions of the ICU libraries up to 54.1 across various platforms.
CVE-2014-9911 is a vulnerability that allows a buffer overflow due to locale strings exceeding 255 characters.
Yes, CVE-2014-9911 can potentially lead to data compromise through unauthorized code execution.