Buffer overflow - CVE-2014-9488
Published: April 14, 2015 / Updated: August 3, 2020
Vulnerability identifier: #VU33081
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2014-9488
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor:
Affected software:
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
How to mitigate CVE-2014-9488
Install update from vendor's website.
Sources
- http://advisories.mageia.org/MGASA-2015-0139.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159449.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00077.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:199
- https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html