First published: Sat Sep 03 2016(Updated: )
International Components for Unicode (ICU) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the Locale class in common/locid.cpp. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icu | <58.1 | 58.1 |
ICU (International Components for Unicode) | <=57.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7415 is considered critical due to its potential for remote code execution.
To mitigate CVE-2016-7415, update to ICU version 58.1 or later.
CVE-2016-7415 affects ICU versions prior to 58.1 and from 57.1 and earlier.
Yes, CVE-2016-7415 can be exploited remotely by sending an overly long string.
CVE-2016-7415 is a stack-based buffer overflow vulnerability.