6.8
CVSSv2

CVE-2014-4607

Published: 12/02/2020 Updated: 14/02/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 prior to 2.07 on 32-bit platforms might allow remote malicious users to execute arbitrary code via a crafted Literal Run.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oberhumer liblzo2

oberhumer lzo2

Vendor Advisories

LZO could be made to crash or run programs if it processed specially crafted data ...
Debian Bug report logs - #752861 CVE-2014-4607: potential integer overflow, fixed in 207 Package: src:lzo2; Maintainer for src:lzo2 is Peter Eisentraut <petere@debianorg>; Reported by: Sebastian Andrzej Siewior <sebastian@breakpointcc> Date: Fri, 27 Jun 2014 07:18:01 UTC Severity: important Tags: fixed-upstream, s ...
Debian Bug report logs - #776186 busybox: CVE-2014-9645: modprobe wrongly accepts paths as module names Package: src:busybox; Maintainer for src:busybox is Debian Install System Team <debian-boot@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 25 Jan 2015 07:06:01 UTC Severity: nor ...
An integer overflow flaw was found in the way the lzo library decompressed certain archives compressed with the LZO algorithm An attacker could create a specially crafted LZO-compressed input that, when decompressed by an application using the lzo library, would cause that application to crash or, potentially, execute arbitrary code (CVE-2014-460 ...
Impact: Moderate Public Date: 2014-06-26 CWE: CWE-190 Bugzilla: 1112418: CVE-2014-4607 lzo: lzo1x_decom ...