First published: Fri Jan 24 2020(Updated: )
The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU coreutils | <=8.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4041 is classified as a medium severity vulnerability that can lead to a denial of service through a heap-based buffer overflow.
To remediate CVE-2015-4041, upgrade GNU Coreutils to version 8.24 or later, which contains the necessary security patches.
CVE-2015-4041 affects GNU Coreutils versions up to and including 8.23 on 64-bit platforms.
Exploiting CVE-2015-4041 can result in a denial of service due to application crashes caused by heap-based buffer overflow.
The root cause of CVE-2015-4041 is a size calculation issue in the keycompare_mb function that fails to consider the byte size of multibyte characters.