Stack-based buffer overflow - CVE-2015-4645
Published: March 17, 2017 / Updated: August 4, 2020
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the read_fragment_table_4 function in unsquash-4.c when processing a crafted input, which triggers a stack-based buffer overflow. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2015-4645
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162171.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162226.html
- http://www.securityfocus.com/bid/75272
- https://bugzilla.redhat.com/show_bug.cgi?id=1234886
- https://github.com/devttys0/sasquatch/pull/5
- https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1
- https://security.gentoo.org/glsa/201701-73