Vulnerability Details : CVE-2014-4715
Yann Collet LZ4 before r119, when used on certain 32-bit platforms that allocate memory beyond 0x80000000, does not properly detect integer overflows, which allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run, a different vulnerability than CVE-2014-4611.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-4715
Probability of exploitation activity in the next 30 days: 0.56%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 75 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-4715
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-4715
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-4715
-
http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html
RealTime Data Compression
-
https://code.google.com/p/lz4/source/detail?r=119
GitHub - lz4/lz4: Extremely Fast Compression algorithm
-
https://code.google.com/p/lz4/issues/detail?id=134
Avoid out-of-bounds reading by mtopolnik · Pull Request #134 · lz4/lz4 · GitHub
-
http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html
The Mouse Trap: I Was Wrong - Proving LZ4 Exploitable With Less Than 4MB
Products affected by CVE-2014-4715
- cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*