CVE-2015-0860
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
03/12/2015
Last modified:
12/04/2025
Description
Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:dpkg:1.16.4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2015/dsa-3407
- http://www.ubuntu.com/usn/USN-2820-1
- https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/dpkg-deb/extract.c?id=e65aa3db04eb908c9507d5d356a95cedb890814d
- https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798324
- https://security.gentoo.org/glsa/201612-07
- http://www.debian.org/security/2015/dsa-3407
- http://www.ubuntu.com/usn/USN-2820-1
- https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/dpkg-deb/extract.c?id=e65aa3db04eb908c9507d5d356a95cedb890814d
- https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798324
- https://security.gentoo.org/glsa/201612-07



