CVE-2015-4645

MEDIUM

Squashfs < 4.3 - Integer Overflow

Title source: rule
STIX 2.1

Description

Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.

References (7)

Core 7
Core References
Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162171.html
Issue Tracking, Third Party Advisory, VDB Entry x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1234886
Third Party Advisory x_refsource_misc
https://github.com/devttys0/sasquatch/pull/5
Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162226.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/75272
Third Party Advisory, VDB Entry vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201701-73

Scores

CVSS v3 5.5
EPSS 0.0021
EPSS Percentile 43.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-190
Status published
Products (3)
fedoraproject/fedora 21
fedoraproject/fedora 22
squashfs_project/squashfs < 4.3
Published Mar 17, 2017
Tracked Since Feb 18, 2026