Integer signedness error in bspatch.c in bspatch in bsdiff, as used in Apple OS X before 10.11.6 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted patch file.
References
Configurations
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html - Mailing List, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-08/msg00026.html - | |
References | () http://seclists.org/fulldisclosure/2020/Jul/8 - | |
References | () http://www.openwall.com/lists/oss-security/2020/07/09/2 - | |
References | () http://www.securityfocus.com/bid/91824 - | |
References | () http://www.securitytracker.com/id/1036438 - | |
References | () https://android.googlesource.com/platform/external/bsdiff/+/4d054795b673855e3a7556c6f2f7ab99ca509998 - Issue Tracking | |
References | () https://bugs.chromium.org/p/chromium/issues/detail?id=372525 - Issue Tracking | |
References | () https://chromium.googlesource.com/chromiumos/third_party/bsdiff/+/d0307d1711bd74e51b783a49f9160775aa22e659 - Issue Tracking | |
References | () https://lists.debian.org/debian-lts-announce/2019/11/msg00028.html - | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-16:25.bspatch.asc - | |
References | () https://security.gentoo.org/glsa/202003-44 - | |
References | () https://support.apple.com/HT206903 - Vendor Advisory | |
References | () https://usn.ubuntu.com/4500-1/ - |
Information
Published : 2016-07-22 02:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-9862
Mitre link : CVE-2014-9862
CVE.ORG link : CVE-2014-9862
JSON object : View
Products Affected
apple
- mac_os_x
CWE
CWE-190
Integer Overflow or Wraparound