First published: Thu Dec 03 2015(Updated: )
Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
dpkg-dev | =1.16.0 | |
dpkg-dev | =1.16.0.1 | |
dpkg-dev | =1.16.0.2 | |
dpkg-dev | =1.16.0.3 | |
dpkg-dev | =1.16.1 | |
dpkg-dev | =1.16.1.1 | |
dpkg-dev | =1.16.1.2 | |
dpkg-dev | =1.16.2 | |
dpkg-dev | =1.16.3 | |
dpkg-dev | =1.16.4 | |
dpkg-dev | =1.16.4.1 | |
dpkg-dev | =1.16.4.2 | |
dpkg-dev | =1.16.4.3 | |
dpkg-dev | =1.16.5 | |
dpkg-dev | =1.16.6 | |
dpkg-dev | =1.16.7 | |
dpkg-dev | =1.16.8 | |
dpkg-dev | =1.16.9 | |
dpkg-dev | =1.16.10 | |
dpkg-dev | =1.16.11 | |
dpkg-dev | =1.16.12 | |
dpkg-dev | =1.16.15 | |
dpkg-dev | =1.17.0 | |
dpkg-dev | =1.17.1 | |
dpkg-dev | =1.17.2 | |
dpkg-dev | =1.17.3 | |
dpkg-dev | =1.17.4 | |
dpkg-dev | =1.17.5 | |
dpkg-dev | =1.17.6 | |
dpkg-dev | =1.17.7 | |
dpkg-dev | =1.17.8 | |
dpkg-dev | =1.17.9 | |
dpkg-dev | =1.17.10 | |
dpkg-dev | =1.17.11 | |
dpkg-dev | =1.17.12 | |
dpkg-dev | =1.17.13 | |
dpkg-dev | =1.17.14 | |
dpkg-dev | =1.17.15 | |
dpkg-dev | =1.17.16 | |
dpkg-dev | =1.17.17 | |
dpkg-dev | =1.17.18 | |
dpkg-dev | =1.17.19 | |
dpkg-dev | =1.17.20 | |
dpkg-dev | =1.17.21 | |
dpkg-dev | =1.17.22 | |
dpkg-dev | =1.17.23 | |
dpkg-dev | =1.17.24 | |
dpkg-dev | =1.17.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0860 has a severity rating of high due to the potential for remote code execution.
To fix CVE-2015-0860, upgrade the dpkg package to version 1.16.17 or later for Debian and the associated Ubuntu versions.
CVE-2015-0860 affects Debian dpkg versions 1.16.x before 1.16.17 and 1.17.x before 1.17.26 as well as specific Ubuntu Linux versions.
Yes, CVE-2015-0860 can be exploited remotely due to the way it processes old-style Debian binary packages.
The impacts of CVE-2015-0860 include the ability for attackers to execute arbitrary code on affected systems.