Severity
10.0CRITICAL
EPSS
2.3%
top 15.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 14
Latest updateMay 14

Description

The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages3 packages

Debianless< 481-1+3
NVDgnu/less471
NVDopensuse/opensuse13.1, 13.2+1

🔴Vulnerability Details

3
GHSA
GHSA-pvw4-m8q5-4fhj: The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which trigg2022-05-14
OSV
CVE-2014-9488: The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which trigg2015-04-14
CVEList
CVE-2014-9488: The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which trigg2015-04-14

📋Vendor Advisories

2
Red Hat
less: out of bounds read access in is_utf8_well_formed()2015-03-10
Debian
CVE-2014-9488: less - The is_utf8_well_formed function in GNU less before 475 allows remote attackers ...2014

💬Community

2
Bugzilla
CVE-2014-9488 less: out of bounds read access in is_utf8_well_formed()2015-03-12
Bugzilla
CVE-2014-9488 less: out of bounds read access in is_utf8_well_formed() [fedora-all]2015-03-12