Vulnerability Description
Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rpm | Rpm | <= 4.12.0 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0529.html
- http://rhn.redhat.com/errata/RHSA-2014-1976.html
- http://www.debian.org/security/2015/dsa-3129Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:251
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:056
- https://security.gentoo.org/glsa/201811-22
- http://advisories.mageia.org/MGASA-2014-0529.html
- http://rhn.redhat.com/errata/RHSA-2014-1976.html
- http://www.debian.org/security/2015/dsa-3129Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:251
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:056
- https://security.gentoo.org/glsa/201811-22
FAQ
What is CVE-2014-8118?
CVE-2014-8118 is a vulnerability with a CVSS score of 10.0 (HIGH). Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow...
How severe is CVE-2014-8118?
CVE-2014-8118 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8118?
Check the references section above for vendor advisories and patch information. Affected products include: Rpm Rpm.