Integer Overflow or Wraparound Affecting bsdiff package, versions <4.3-17


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
94.36% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-BSDIFF-279830
  • published22 Jul 2016
  • disclosed22 Jul 2016

Introduced: 22 Jul 2016

CVE-2014-9862  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Debian:10 bsdiff to version 4.3-17 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bsdiff package and not the bsdiff package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Integer signedness error in bspatch.c in bspatch in bsdiff, as used in Apple OS X before 10.11.6 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted patch file.

CVSS Scores

version 3.1