[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-4608Date: (C)2014-07-03   (M)2024-04-17


Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-60011
SECUNIA-60174
SECUNIA-62633
BID-68214
RHSA-2015:0062
SUSE-SU-2015:0481
SUSE-SU-2015:0736
USN-2416-1
USN-2417-1
USN-2418-1
USN-2419-1
USN-2420-1
USN-2421-1
http://www.openwall.com/lists/oss-security/2014/06/26/21
http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
http://www.oberhumer.com/opensource/lzo/
https://bugzilla.redhat.com/show_bug.cgi?id=1113899
https://github.com/torvalds/linux/commit/206a81c18401c0cde6e579164f752c4b147324ce
https://www.securitymouse.com/lms-2014-06-16-2
openSUSE-SU-2015:0566

CWE    1
CWE-190
OVAL    16
oval:org.secpod.oval:def:1500779
oval:org.secpod.oval:def:702299
oval:org.secpod.oval:def:702111
oval:org.secpod.oval:def:702121
...

© SecPod Technologies