Heap-Based Buffer Overflow in GNU Coreutils Affects 64-Bit Platforms
CVE-2015-4041

7.8HIGH

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
24 January 2020

Summary

The keycompare_mb function within the sort component of GNU Coreutils versions up to 8.23 on 64-bit platforms is vulnerable due to inadequate size calculation for multibyte characters. This flaw can lead to a denial of service, resulting in a heap-based buffer overflow and potential application crashes. Attackers may exploit this vulnerability by delivering specially crafted long UTF-8 strings, which may disrupt service and could have additional unforeseen impacts.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.