Unknown
CVE-2015-0860
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an “old-style” Debian binary package, which triggers a stack-based buffer overflow.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- dpkg 1.16.0,
- dpkg 1.16.0.1,
- dpkg 1.16.0.2,
- dpkg 1.16.0.3,
- dpkg 1.16.1,
- dpkg 1.16.1.1,
- dpkg 1.16.1.2,
- dpkg 1.16.10,
- dpkg 1.16.11,
- dpkg 1.16.12,
- dpkg 1.16.15,
- dpkg 1.16.2,
- dpkg 1.16.3,
- dpkg 1.16.4,
- dpkg 1.16.4.1,
- dpkg 1.16.4.2,
- dpkg 1.16.4.3,
- dpkg 1.16.5,
- dpkg 1.16.6,
- dpkg 1.16.7,
- dpkg 1.16.8,
- dpkg 1.16.9,
- dpkg 1.17.0,
- dpkg 1.17.1,
- dpkg 1.17.10,
- dpkg 1.17.11,
- dpkg 1.17.12,
- dpkg 1.17.13,
- dpkg 1.17.14,
- dpkg 1.17.15,
- dpkg 1.17.16,
- dpkg 1.17.17,
- dpkg 1.17.18,
- dpkg 1.17.19,
- dpkg 1.17.2,
- dpkg 1.17.20,
- dpkg 1.17.21,
- dpkg 1.17.22,
- dpkg 1.17.23,
- dpkg 1.17.24,
- dpkg 1.17.25,
- dpkg 1.17.3,
- dpkg 1.17.4,
- dpkg 1.17.5,
- dpkg 1.17.6,
- dpkg 1.17.7,
- dpkg 1.17.8,
- dpkg 1.17.9,
- ubuntu linux 12.04,
- ubuntu linux 14.04,
- ubuntu linux 15.04,
- ubuntu linux 15.10
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: