CVE-2020-14315Out-of-bounds Write in Bsdiff

Severity
9.8CRITICALNVD
EPSS
0.5%
top 35.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16
Latest updateMay 24

Description

A memory corruption vulnerability is present in bspatch as shipped in Colin Percival’s bsdiff tools version 4.3. Insufficient checks when handling external inputs allows an attacker to bypass the sanity checks in place and write out of a dynamically allocated buffer boundaries.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

debiandebian/bsdiff< bsdiff 4.3-22 (bookworm)
Debiandaemonology/bsdiff< 4.3-22+3
CVEListV5daemonology/bsdiffbsdiff 4.3

🔴Vulnerability Details

2
GHSA
GHSA-g2hg-j8m2-ppxr: A memory corruption vulnerability is present in bspatch as shipped in Colin Percival’s bsdiff tools version 42022-05-24
OSV
CVE-2020-14315: A memory corruption vulnerability is present in bspatch as shipped in Colin Percival’s bsdiff tools version 42020-09-16

📋Vendor Advisories

1
Debian
CVE-2020-14315: bsdiff - A memory corruption vulnerability is present in bspatch as shipped in Colin Perc...2020

💬Community

3
Bugzilla
CVE-2020-14315 bsdiff: handling external inputs allows attacker to bypass sanity checks [fedora-all]2020-07-14
Bugzilla
CVE-2020-14315 bsdiff: handling external inputs allows attacker to bypass sanity checks [epel-6]2020-07-14
Bugzilla
CVE-2020-14315 bsdiff: handling external inputs allows attacker to bypass sanity checks2020-07-14