Search for vulnerabilities
Vulnerability details: VCID-t7v2-yu54-aaaa
Vulnerability ID VCID-t7v2-yu54-aaaa
Aliases CVE-2014-9911
Summary Stack-based buffer overflow in the ures_getByKeyWithFallback function in common/uresbund.cpp in International Components for Unicode (ICU) before 54.1 for C/C++ allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted uloc_getDisplayName call.
Status Published
Exploitability 0.5
Weighted Severity 8.8
Risk 4.4
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://bugs.icu-project.org/trac/ticket/10891
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-9911.html
cvssv3 8.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9911.json
epss 0.01659 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01659 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01659 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01659 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.01859 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03025 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.03695 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
epss 0.07099 https://api.first.org/data/v1/epss?cve=CVE-2014-9911
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1383569
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
cvssv2 6.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2014-9911
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2014-9911
generic_textual Medium https://ubuntu.com/security/notices/USN-3227-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-3227-1
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
generic_textual LOW https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
generic_textual Medium http://www.openwall.com/lists/oss-security/2016/11/25/1
Reference id Reference type URL
http://bugs.icu-project.org/trac/changeset/35699
http://bugs.icu-project.org/trac/ticket/1089
http://bugs.icu-project.org/trac/ticket/10891
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-9911.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9911.json
https://api.first.org/data/v1/epss?cve=CVE-2014-9911
https://bugs.php.net/bug.php?id=67397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://ubuntu.com/security/notices/USN-3227-1
https://usn.ubuntu.com/usn/usn-3227-1
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
http://www.openwall.com/lists/oss-security/2016/11/25/1
http://www.securityfocus.com/bid/94520
http://www.securitytracker.com/id/1037556
1383569 https://bugzilla.redhat.com/show_bug.cgi?id=1383569
cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\/c\+\+:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\/c\+\+:*:*
CVE-2014-9911 https://nvd.nist.gov/vuln/detail/CVE-2014-9911
USN-3227-1 https://usn.ubuntu.com/3227-1/
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9911.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2014-9911
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2014-9911
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.87260
EPSS Score 0.01659
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.