Unknown
CVE-2015-0860
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an “old-style” Debian binary package, which triggers a stack-based buffer overflow.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- dpkg 1.16.0
- dpkg 1.16.0.1
- dpkg 1.16.0.2
- dpkg 1.16.0.3
- dpkg 1.16.1
- dpkg 1.16.1.1
- dpkg 1.16.1.2
- dpkg 1.16.10
- dpkg 1.16.11
- dpkg 1.16.12
- dpkg 1.16.15
- dpkg 1.16.2
- dpkg 1.16.3
- dpkg 1.16.4
- dpkg 1.16.4.1
- dpkg 1.16.4.2
- dpkg 1.16.4.3
- dpkg 1.16.5
- dpkg 1.16.6
- dpkg 1.16.7
- dpkg 1.16.8
- dpkg 1.16.9
- dpkg 1.17.0
- dpkg 1.17.1
- dpkg 1.17.10
- dpkg 1.17.11
- dpkg 1.17.12
- dpkg 1.17.13
- dpkg 1.17.14
- dpkg 1.17.15
- dpkg 1.17.16
- dpkg 1.17.17
- dpkg 1.17.18
- dpkg 1.17.19
- dpkg 1.17.2
- dpkg 1.17.20
- dpkg 1.17.21
- dpkg 1.17.22
- dpkg 1.17.23
- dpkg 1.17.24
- dpkg 1.17.25
- dpkg 1.17.3
- dpkg 1.17.4
- dpkg 1.17.5
- dpkg 1.17.6
- dpkg 1.17.7
- dpkg 1.17.8
- dpkg 1.17.9
- ubuntu linux 12.04
- ubuntu linux 14.04
- ubuntu linux 15.04
- ubuntu linux 15.10
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: