Action not permitted
Modal body text goes here.
Modal Title
Modal Body
Vulnerability from csaf_suse
Published
2017-10-10 19:37
Modified
2017-10-10 19:37
Summary
Security update for SLES 12 Docker image
Notes
Title of the patch
Security update for SLES 12 Docker image
Description of the patch
The SUSE Linux Enterprise Server 12 container image has been updated to include
security and stability fixes.
The following issues related to building of the container images have been fixed:
- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a
dependency by the Build Service solver. (bsc#1056193)
- Do not install recommended packages when building container images. (bsc#975726)
A number of security issues that have been already fixed by updates released for
SUSE Linux Enterprise Server 12 are now included in the base image. A package/CVE
cross-reference is available below.
pam:
- CVE-2015-3238
libtasn1:
- CVE-2015-3622
- CVE-2016-4008
libidn:
- CVE-2015-2059
- CVE-2015-8948
- CVE-2016-6261
- CVE-2016-6262
- CVE-2016-6263
zlib:
- CVE-2016-9840
- CVE-2016-9841
- CVE-2016-9842
- CVE-2016-9843
curl:
- CVE-2016-5419
- CVE-2016-5420
- CVE-2016-5421
- CVE-2016-7141
- CVE-2016-7167
- CVE-2016-8615
- CVE-2016-8616
- CVE-2016-8617
- CVE-2016-8618
- CVE-2016-8619
- CVE-2016-8620
- CVE-2016-8621
- CVE-2016-8622
- CVE-2016-8623
- CVE-2016-8624
- CVE-2016-9586
- CVE-2017-1000100
- CVE-2017-1000101
- CVE-2017-7407
openssl:
- CVE-2016-2105
- CVE-2016-2106
- CVE-2016-2107
- CVE-2016-2108
- CVE-2016-2109
- CVE-2016-2177
- CVE-2016-2178
- CVE-2016-2179
- CVE-2016-2180
- CVE-2016-2181
- CVE-2016-2182
- CVE-2016-2183
- CVE-2016-6302
- CVE-2016-6303
- CVE-2016-6304
- CVE-2016-6306
libxml2:
- CVE-2014-0191
- CVE-2015-8806
- CVE-2016-1762
- CVE-2016-1833
- CVE-2016-1834
- CVE-2016-1835
- CVE-2016-1837
- CVE-2016-1838
- CVE-2016-1839
- CVE-2016-1840
- CVE-2016-2073
- CVE-2016-3627
- CVE-2016-3705
- CVE-2016-4447
- CVE-2016-4448
- CVE-2016-4449
- CVE-2016-4483
- CVE-2016-4658
- CVE-2016-9318
- CVE-2016-9597
- CVE-2017-9047
- CVE-2017-9048
- CVE-2017-9049
- CVE-2017-9050
util-linux:
- CVE-2015-5218
- CVE-2016-5011
- CVE-2017-2616
cracklib:
- CVE-2016-6318
systemd:
- CVE-2014-9770
- CVE-2015-8842
- CVE-2016-7796
pcre:
- CVE-2014-8964
- CVE-2015-2325
- CVE-2015-2327
- CVE-2015-2328
- CVE-2015-3210
- CVE-2015-3217
- CVE-2015-5073
- CVE-2015-8380
- CVE-2015-8381
- CVE-2015-8382
- CVE-2015-8383
- CVE-2015-8384
- CVE-2015-8385
- CVE-2015-8386
- CVE-2015-8387
- CVE-2015-8388
- CVE-2015-8389
- CVE-2015-8390
- CVE-2015-8391
- CVE-2015-8392
- CVE-2015-8393
- CVE-2015-8394
- CVE-2015-8395
- CVE-2016-1283
- CVE-2016-3191
appamor:
- CVE-2017-6507
bash:
- CVE-2014-6277
- CVE-2014-6278
- CVE-2016-0634
- CVE-2016-7543
cpio:
- CVE-2016-2037
glibc:
- CVE-2016-1234
- CVE-2016-3075
- CVE-2016-3706
- CVE-2016-4429
- CVE-2017-1000366
perl:
- CVE-2015-8853
- CVE-2016-1238
- CVE-2016-2381
- CVE-2016-6185
libssh2_org:
- CVE-2016-0787
expat:
- CVE-2012-6702
- CVE-2015-1283
- CVE-2016-0718
- CVE-2016-5300
- CVE-2016-9063
- CVE-2017-9233
ncurses:
- CVE-2017-10684
- CVE-2017-10685
- CVE-2017-11112
- CVE-2017-11113
libksba:
- CVE-2016-4574
- CVE-2016-4579
libgcrypt:
- CVE-2015-7511
- CVE-2016-6313
- CVE-2017-7526
dbus-1:
- CVE-2014-7824
- CVE-2015-0245
Finally, the following packages received non-security fixes:
- augeas
- bzip2
- ca-certificates-mozilla
- coreutils
- cryptsetup
- cyrus-sasl
- dirmngr
- e2fsprogs
- findutils
- gpg2
- insserv-compat
- kmod
- libcap
- libsolv
- libzypp
- openldap2
- p11-kit
- permissions
- procps
- rpm
- sed
- shadow
- zypper
Patchnames
SUSE-SLE-Module-Containers-12-2017-1672
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for SLES 12 Docker image", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise Server 12 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nutil-linux:\n\n- CVE-2015-5218\n- CVE-2016-5011\n- CVE-2017-2616\n\ncracklib:\n\n- CVE-2016-6318\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- openldap2\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- shadow\n- zypper\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Containers-12-2017-1672", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2699-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2699-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172699-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2699-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html", }, { category: "self", summary: "SUSE Bug 1056193", url: "https://bugzilla.suse.com/1056193", }, { category: "self", summary: "SUSE Bug 975726", url: "https://bugzilla.suse.com/975726", }, { category: "self", summary: "SUSE CVE CVE-2012-6702 page", url: "https://www.suse.com/security/cve/CVE-2012-6702/", }, { category: "self", summary: "SUSE CVE CVE-2014-0191 page", url: "https://www.suse.com/security/cve/CVE-2014-0191/", }, { category: "self", summary: "SUSE CVE CVE-2014-6271 page", url: "https://www.suse.com/security/cve/CVE-2014-6271/", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2014-7169 page", url: "https://www.suse.com/security/cve/CVE-2014-7169/", }, { category: "self", summary: "SUSE CVE CVE-2014-7187 page", url: "https://www.suse.com/security/cve/CVE-2014-7187/", }, { category: "self", summary: "SUSE CVE CVE-2014-7824 page", url: "https://www.suse.com/security/cve/CVE-2014-7824/", }, { category: "self", summary: "SUSE CVE CVE-2014-8964 page", url: "https://www.suse.com/security/cve/CVE-2014-8964/", }, { category: "self", summary: "SUSE CVE CVE-2014-9770 page", url: "https://www.suse.com/security/cve/CVE-2014-9770/", }, { category: "self", summary: "SUSE CVE CVE-2015-0245 page", url: "https://www.suse.com/security/cve/CVE-2015-0245/", }, { category: "self", summary: "SUSE CVE CVE-2015-1283 page", url: "https://www.suse.com/security/cve/CVE-2015-1283/", }, { category: "self", summary: "SUSE CVE CVE-2015-2059 page", url: "https://www.suse.com/security/cve/CVE-2015-2059/", }, { category: "self", summary: "SUSE CVE CVE-2015-2325 page", url: "https://www.suse.com/security/cve/CVE-2015-2325/", }, { category: "self", summary: "SUSE CVE CVE-2015-2327 page", url: "https://www.suse.com/security/cve/CVE-2015-2327/", }, { category: "self", summary: "SUSE CVE CVE-2015-2328 page", url: "https://www.suse.com/security/cve/CVE-2015-2328/", }, { category: "self", summary: "SUSE CVE CVE-2015-3210 page", url: "https://www.suse.com/security/cve/CVE-2015-3210/", }, { category: "self", summary: "SUSE CVE CVE-2015-3217 page", url: "https://www.suse.com/security/cve/CVE-2015-3217/", }, { category: "self", summary: "SUSE CVE CVE-2015-3238 page", url: "https://www.suse.com/security/cve/CVE-2015-3238/", }, { category: "self", summary: "SUSE CVE CVE-2015-3622 page", url: "https://www.suse.com/security/cve/CVE-2015-3622/", }, { category: "self", summary: "SUSE CVE CVE-2015-5073 page", url: "https://www.suse.com/security/cve/CVE-2015-5073/", }, { category: "self", summary: "SUSE CVE CVE-2015-5218 page", url: "https://www.suse.com/security/cve/CVE-2015-5218/", }, { category: "self", summary: "SUSE CVE CVE-2015-5276 page", url: "https://www.suse.com/security/cve/CVE-2015-5276/", }, { category: "self", summary: "SUSE CVE CVE-2015-7511 page", url: "https://www.suse.com/security/cve/CVE-2015-7511/", }, { category: "self", summary: "SUSE CVE CVE-2015-8380 page", url: "https://www.suse.com/security/cve/CVE-2015-8380/", }, { category: "self", summary: "SUSE CVE CVE-2015-8381 page", url: "https://www.suse.com/security/cve/CVE-2015-8381/", }, { category: "self", summary: "SUSE CVE CVE-2015-8382 page", url: "https://www.suse.com/security/cve/CVE-2015-8382/", }, { category: "self", summary: "SUSE CVE CVE-2015-8383 page", url: "https://www.suse.com/security/cve/CVE-2015-8383/", }, { category: "self", summary: "SUSE CVE CVE-2015-8384 page", url: "https://www.suse.com/security/cve/CVE-2015-8384/", }, { category: "self", summary: "SUSE CVE CVE-2015-8385 page", url: "https://www.suse.com/security/cve/CVE-2015-8385/", }, { category: "self", summary: "SUSE CVE CVE-2015-8386 page", url: "https://www.suse.com/security/cve/CVE-2015-8386/", }, { category: "self", summary: "SUSE CVE CVE-2015-8387 page", url: "https://www.suse.com/security/cve/CVE-2015-8387/", }, { category: "self", summary: "SUSE CVE CVE-2015-8388 page", url: "https://www.suse.com/security/cve/CVE-2015-8388/", }, { category: "self", summary: "SUSE CVE CVE-2015-8389 page", url: "https://www.suse.com/security/cve/CVE-2015-8389/", }, { category: "self", summary: "SUSE CVE CVE-2015-8390 page", url: "https://www.suse.com/security/cve/CVE-2015-8390/", }, { category: "self", summary: "SUSE CVE CVE-2015-8391 page", url: "https://www.suse.com/security/cve/CVE-2015-8391/", }, { category: "self", summary: "SUSE CVE CVE-2015-8392 page", url: "https://www.suse.com/security/cve/CVE-2015-8392/", }, { category: "self", summary: "SUSE CVE CVE-2015-8393 page", url: "https://www.suse.com/security/cve/CVE-2015-8393/", }, { category: "self", summary: "SUSE CVE CVE-2015-8394 page", url: "https://www.suse.com/security/cve/CVE-2015-8394/", }, { category: "self", summary: "SUSE CVE CVE-2015-8395 page", url: "https://www.suse.com/security/cve/CVE-2015-8395/", }, { category: "self", summary: "SUSE CVE CVE-2015-8806 page", url: "https://www.suse.com/security/cve/CVE-2015-8806/", }, { category: "self", summary: "SUSE CVE CVE-2015-8842 page", url: "https://www.suse.com/security/cve/CVE-2015-8842/", }, { category: "self", summary: "SUSE CVE CVE-2015-8853 page", url: "https://www.suse.com/security/cve/CVE-2015-8853/", }, { category: "self", summary: "SUSE CVE CVE-2015-8948 page", url: "https://www.suse.com/security/cve/CVE-2015-8948/", }, { category: "self", summary: "SUSE CVE CVE-2016-0634 page", url: "https://www.suse.com/security/cve/CVE-2016-0634/", }, { category: "self", summary: "SUSE CVE CVE-2016-0718 page", url: "https://www.suse.com/security/cve/CVE-2016-0718/", }, { category: "self", summary: "SUSE CVE CVE-2016-0787 page", url: "https://www.suse.com/security/cve/CVE-2016-0787/", }, { category: "self", summary: "SUSE CVE CVE-2016-1234 page", url: "https://www.suse.com/security/cve/CVE-2016-1234/", }, { category: "self", summary: "SUSE CVE CVE-2016-1238 page", url: "https://www.suse.com/security/cve/CVE-2016-1238/", }, { category: "self", summary: "SUSE CVE CVE-2016-1283 page", url: "https://www.suse.com/security/cve/CVE-2016-1283/", }, { category: "self", summary: "SUSE CVE CVE-2016-1762 page", url: "https://www.suse.com/security/cve/CVE-2016-1762/", }, { category: "self", summary: "SUSE CVE CVE-2016-1833 page", url: "https://www.suse.com/security/cve/CVE-2016-1833/", }, { category: "self", summary: "SUSE CVE CVE-2016-1834 page", url: "https://www.suse.com/security/cve/CVE-2016-1834/", }, { category: "self", summary: "SUSE CVE CVE-2016-1835 page", url: "https://www.suse.com/security/cve/CVE-2016-1835/", }, { category: "self", summary: "SUSE CVE CVE-2016-1837 page", url: "https://www.suse.com/security/cve/CVE-2016-1837/", }, { category: "self", summary: "SUSE CVE CVE-2016-1838 page", url: "https://www.suse.com/security/cve/CVE-2016-1838/", }, { category: "self", summary: "SUSE CVE CVE-2016-1839 page", url: "https://www.suse.com/security/cve/CVE-2016-1839/", }, { category: "self", summary: "SUSE CVE CVE-2016-1840 page", url: "https://www.suse.com/security/cve/CVE-2016-1840/", }, { category: "self", summary: "SUSE CVE CVE-2016-2037 page", url: "https://www.suse.com/security/cve/CVE-2016-2037/", }, { category: "self", summary: "SUSE CVE CVE-2016-2073 page", url: "https://www.suse.com/security/cve/CVE-2016-2073/", }, { category: "self", summary: "SUSE CVE CVE-2016-2105 page", url: "https://www.suse.com/security/cve/CVE-2016-2105/", }, { category: "self", summary: "SUSE CVE CVE-2016-2106 page", url: "https://www.suse.com/security/cve/CVE-2016-2106/", }, { category: "self", summary: "SUSE CVE CVE-2016-2107 page", url: "https://www.suse.com/security/cve/CVE-2016-2107/", }, { category: "self", summary: "SUSE CVE CVE-2016-2108 page", url: "https://www.suse.com/security/cve/CVE-2016-2108/", }, { category: "self", summary: "SUSE CVE CVE-2016-2109 page", url: "https://www.suse.com/security/cve/CVE-2016-2109/", }, { category: "self", summary: "SUSE CVE CVE-2016-2177 page", url: "https://www.suse.com/security/cve/CVE-2016-2177/", }, { category: "self", summary: "SUSE CVE CVE-2016-2178 page", url: "https://www.suse.com/security/cve/CVE-2016-2178/", }, { category: "self", summary: "SUSE CVE CVE-2016-2179 page", url: "https://www.suse.com/security/cve/CVE-2016-2179/", }, { category: "self", summary: "SUSE CVE CVE-2016-2180 page", url: "https://www.suse.com/security/cve/CVE-2016-2180/", }, { category: "self", summary: "SUSE CVE CVE-2016-2181 page", url: "https://www.suse.com/security/cve/CVE-2016-2181/", }, { category: "self", summary: "SUSE CVE CVE-2016-2182 page", url: "https://www.suse.com/security/cve/CVE-2016-2182/", }, { category: "self", summary: "SUSE CVE CVE-2016-2183 page", url: "https://www.suse.com/security/cve/CVE-2016-2183/", }, { category: "self", summary: "SUSE CVE CVE-2016-2381 page", url: "https://www.suse.com/security/cve/CVE-2016-2381/", }, { category: "self", summary: "SUSE CVE CVE-2016-3075 page", url: "https://www.suse.com/security/cve/CVE-2016-3075/", }, { category: "self", summary: "SUSE CVE CVE-2016-3191 page", url: "https://www.suse.com/security/cve/CVE-2016-3191/", }, { category: "self", summary: "SUSE CVE CVE-2016-3627 page", url: "https://www.suse.com/security/cve/CVE-2016-3627/", }, { category: "self", summary: "SUSE CVE CVE-2016-3705 page", url: "https://www.suse.com/security/cve/CVE-2016-3705/", }, { category: "self", summary: "SUSE CVE CVE-2016-3706 page", url: "https://www.suse.com/security/cve/CVE-2016-3706/", }, { category: "self", summary: "SUSE CVE CVE-2016-4008 page", url: "https://www.suse.com/security/cve/CVE-2016-4008/", }, { category: "self", summary: "SUSE CVE CVE-2016-4429 page", url: "https://www.suse.com/security/cve/CVE-2016-4429/", }, { category: "self", summary: "SUSE CVE CVE-2016-4447 page", url: "https://www.suse.com/security/cve/CVE-2016-4447/", }, { category: "self", summary: "SUSE CVE CVE-2016-4448 page", url: "https://www.suse.com/security/cve/CVE-2016-4448/", }, { category: "self", summary: "SUSE CVE CVE-2016-4449 page", url: "https://www.suse.com/security/cve/CVE-2016-4449/", }, { category: "self", summary: "SUSE CVE CVE-2016-4483 page", url: "https://www.suse.com/security/cve/CVE-2016-4483/", }, { category: "self", summary: "SUSE CVE CVE-2016-4574 page", url: "https://www.suse.com/security/cve/CVE-2016-4574/", }, { category: "self", summary: "SUSE CVE CVE-2016-4579 page", url: "https://www.suse.com/security/cve/CVE-2016-4579/", }, { category: "self", summary: "SUSE CVE CVE-2016-4658 page", url: "https://www.suse.com/security/cve/CVE-2016-4658/", }, { category: "self", summary: "SUSE CVE CVE-2016-5011 page", url: "https://www.suse.com/security/cve/CVE-2016-5011/", }, { category: "self", summary: "SUSE CVE CVE-2016-5300 page", url: "https://www.suse.com/security/cve/CVE-2016-5300/", }, { category: "self", summary: "SUSE CVE CVE-2016-5419 page", url: "https://www.suse.com/security/cve/CVE-2016-5419/", }, { category: "self", summary: "SUSE CVE CVE-2016-5420 page", url: "https://www.suse.com/security/cve/CVE-2016-5420/", }, { category: "self", summary: "SUSE CVE CVE-2016-5421 page", url: "https://www.suse.com/security/cve/CVE-2016-5421/", }, { category: "self", summary: "SUSE CVE CVE-2016-6185 page", url: "https://www.suse.com/security/cve/CVE-2016-6185/", }, { category: "self", summary: "SUSE CVE CVE-2016-6261 page", url: "https://www.suse.com/security/cve/CVE-2016-6261/", }, { category: "self", summary: "SUSE CVE CVE-2016-6262 page", url: "https://www.suse.com/security/cve/CVE-2016-6262/", }, { category: "self", summary: "SUSE CVE CVE-2016-6263 page", url: "https://www.suse.com/security/cve/CVE-2016-6263/", }, { category: "self", summary: "SUSE CVE CVE-2016-6302 page", url: "https://www.suse.com/security/cve/CVE-2016-6302/", }, { category: "self", summary: "SUSE CVE CVE-2016-6303 page", url: "https://www.suse.com/security/cve/CVE-2016-6303/", }, { category: "self", summary: "SUSE CVE CVE-2016-6304 page", url: "https://www.suse.com/security/cve/CVE-2016-6304/", }, { category: "self", summary: "SUSE CVE CVE-2016-6306 page", url: "https://www.suse.com/security/cve/CVE-2016-6306/", }, { category: "self", summary: "SUSE CVE CVE-2016-6313 page", url: "https://www.suse.com/security/cve/CVE-2016-6313/", }, { category: "self", summary: "SUSE CVE CVE-2016-6318 page", url: "https://www.suse.com/security/cve/CVE-2016-6318/", }, { category: "self", summary: "SUSE CVE CVE-2016-7141 page", url: "https://www.suse.com/security/cve/CVE-2016-7141/", }, { category: "self", summary: "SUSE CVE CVE-2016-7167 page", url: "https://www.suse.com/security/cve/CVE-2016-7167/", }, { category: "self", summary: "SUSE CVE CVE-2016-7543 page", url: "https://www.suse.com/security/cve/CVE-2016-7543/", }, { category: "self", summary: "SUSE CVE CVE-2016-7796 page", url: "https://www.suse.com/security/cve/CVE-2016-7796/", }, { category: "self", summary: "SUSE CVE CVE-2016-8615 page", url: "https://www.suse.com/security/cve/CVE-2016-8615/", }, { category: "self", summary: "SUSE CVE CVE-2016-8616 page", url: "https://www.suse.com/security/cve/CVE-2016-8616/", }, { category: "self", summary: "SUSE CVE CVE-2016-8617 page", url: "https://www.suse.com/security/cve/CVE-2016-8617/", }, { category: "self", summary: "SUSE CVE CVE-2016-8618 page", url: "https://www.suse.com/security/cve/CVE-2016-8618/", }, { category: "self", summary: "SUSE CVE CVE-2016-8619 page", url: "https://www.suse.com/security/cve/CVE-2016-8619/", }, { category: "self", summary: "SUSE CVE CVE-2016-8620 page", url: "https://www.suse.com/security/cve/CVE-2016-8620/", }, { category: "self", summary: "SUSE CVE CVE-2016-8621 page", url: "https://www.suse.com/security/cve/CVE-2016-8621/", }, { category: "self", summary: "SUSE CVE CVE-2016-8622 page", url: "https://www.suse.com/security/cve/CVE-2016-8622/", }, { category: "self", summary: "SUSE CVE CVE-2016-8623 page", url: "https://www.suse.com/security/cve/CVE-2016-8623/", }, { category: "self", summary: "SUSE CVE CVE-2016-8624 page", url: "https://www.suse.com/security/cve/CVE-2016-8624/", }, { category: "self", summary: "SUSE CVE CVE-2016-9063 page", url: "https://www.suse.com/security/cve/CVE-2016-9063/", }, { category: "self", summary: "SUSE CVE CVE-2016-9318 page", url: "https://www.suse.com/security/cve/CVE-2016-9318/", }, { category: "self", summary: "SUSE CVE CVE-2016-9586 page", url: "https://www.suse.com/security/cve/CVE-2016-9586/", }, { category: "self", summary: "SUSE CVE CVE-2016-9597 page", url: "https://www.suse.com/security/cve/CVE-2016-9597/", }, { category: "self", summary: "SUSE CVE CVE-2016-9840 page", url: "https://www.suse.com/security/cve/CVE-2016-9840/", }, { category: "self", summary: "SUSE CVE CVE-2016-9841 page", url: "https://www.suse.com/security/cve/CVE-2016-9841/", }, { category: "self", summary: "SUSE CVE CVE-2016-9842 page", url: "https://www.suse.com/security/cve/CVE-2016-9842/", }, { category: "self", summary: "SUSE CVE CVE-2016-9843 page", url: "https://www.suse.com/security/cve/CVE-2016-9843/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000100 page", url: "https://www.suse.com/security/cve/CVE-2017-1000100/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000101 page", url: "https://www.suse.com/security/cve/CVE-2017-1000101/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000366 page", url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { category: "self", summary: "SUSE CVE CVE-2017-10684 page", url: "https://www.suse.com/security/cve/CVE-2017-10684/", }, { category: "self", summary: "SUSE CVE CVE-2017-10685 page", url: "https://www.suse.com/security/cve/CVE-2017-10685/", }, { category: "self", summary: "SUSE CVE CVE-2017-11112 page", url: "https://www.suse.com/security/cve/CVE-2017-11112/", }, { category: "self", summary: "SUSE CVE CVE-2017-11113 page", url: "https://www.suse.com/security/cve/CVE-2017-11113/", }, { category: "self", summary: "SUSE CVE CVE-2017-2616 page", url: "https://www.suse.com/security/cve/CVE-2017-2616/", }, { category: "self", summary: "SUSE CVE CVE-2017-6507 page", url: "https://www.suse.com/security/cve/CVE-2017-6507/", }, { category: "self", summary: "SUSE CVE CVE-2017-7407 page", url: "https://www.suse.com/security/cve/CVE-2017-7407/", }, { category: "self", summary: "SUSE CVE CVE-2017-7526 page", url: "https://www.suse.com/security/cve/CVE-2017-7526/", }, { category: "self", summary: "SUSE CVE CVE-2017-9047 page", url: "https://www.suse.com/security/cve/CVE-2017-9047/", }, { category: "self", summary: "SUSE CVE CVE-2017-9048 page", url: "https://www.suse.com/security/cve/CVE-2017-9048/", }, { category: "self", summary: "SUSE CVE CVE-2017-9049 page", url: "https://www.suse.com/security/cve/CVE-2017-9049/", }, { category: "self", summary: "SUSE CVE CVE-2017-9050 page", url: "https://www.suse.com/security/cve/CVE-2017-9050/", }, { category: "self", summary: "SUSE CVE CVE-2017-9233 page", url: "https://www.suse.com/security/cve/CVE-2017-9233/", }, ], title: "Security update for SLES 12 Docker image", tracking: { current_release_date: "2017-10-10T19:37:24Z", generator: { date: "2017-10-10T19:37:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2699-1", initial_release_date: "2017-10-10T19:37:24Z", revision_history: [ { date: "2017-10-10T19:37:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.ppc64le", product: { name: "sles12-docker-image-1.1.4-20171002.ppc64le", product_id: "sles12-docker-image-1.1.4-20171002.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.s390x", product: { name: "sles12-docker-image-1.1.4-20171002.s390x", product_id: "sles12-docker-image-1.1.4-20171002.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.x86_64", product: { name: "sles12-docker-image-1.1.4-20171002.x86_64", product_id: "sles12-docker-image-1.1.4-20171002.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Containers 12", product: { name: "SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-containers:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", }, product_reference: "sles12-docker-image-1.1.4-20171002.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", }, product_reference: "sles12-docker-image-1.1.4-20171002.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", }, product_reference: "sles12-docker-image-1.1.4-20171002.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, ], }, vulnerabilities: [ { cve: "CVE-2012-6702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6702", }, ], notes: [ { category: "general", text: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6702", url: "https://www.suse.com/security/cve/CVE-2012-6702", }, { category: "external", summary: "SUSE Bug 983215 for CVE-2012-6702", url: "https://bugzilla.suse.com/983215", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2012-6702", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2012-6702", }, { cve: "CVE-2014-0191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0191", }, ], notes: [ { category: "general", text: "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0191", url: "https://www.suse.com/security/cve/CVE-2014-0191", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2014-0191", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2014-0191", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 876652 for CVE-2014-0191", url: "https://bugzilla.suse.com/876652", }, { category: "external", summary: "SUSE Bug 877506 for CVE-2014-0191", url: "https://bugzilla.suse.com/877506", }, { category: "external", summary: "SUSE Bug 996079 for CVE-2014-0191", url: "https://bugzilla.suse.com/996079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-0191", }, { cve: "CVE-2014-6271", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6271", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6271", url: "https://www.suse.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-6271", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-6271", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-6271", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-6271", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-6271", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6271", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6271", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6271", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6271", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6271", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-6271", }, { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2014-7169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7169", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7169", url: "https://www.suse.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7169", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-7169", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-7169", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-7169", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-7169", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898762 for CVE-2014-7169", url: "https://bugzilla.suse.com/898762", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7169", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7169", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7169", url: "https://bugzilla.suse.com/899039", }, { category: "external", summary: "SUSE Bug 899266 for CVE-2014-7169", url: "https://bugzilla.suse.com/899266", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-7169", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-7169", url: "https://bugzilla.suse.com/900454", }, { category: "external", summary: "SUSE Bug 902237 for CVE-2014-7169", url: "https://bugzilla.suse.com/902237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-7169", }, { cve: "CVE-2014-7187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7187", }, ], notes: [ { category: "general", text: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7187", url: "https://www.suse.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7187", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7187", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7187", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7187", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7187", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-7187", }, { cve: "CVE-2014-7824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7824", }, ], notes: [ { category: "general", text: "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7824", url: "https://www.suse.com/security/cve/CVE-2014-7824", }, { category: "external", summary: "SUSE Bug 904017 for CVE-2014-7824", url: "https://bugzilla.suse.com/904017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-7824", }, { cve: "CVE-2014-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8964", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8964", url: "https://www.suse.com/security/cve/CVE-2014-8964", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2014-8964", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2014-8964", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2014-8964", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2014-8964", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2014-8964", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-8964", }, { cve: "CVE-2014-9770", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9770", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9770", url: "https://www.suse.com/security/cve/CVE-2014-9770", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2014-9770", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-9770", }, { cve: "CVE-2015-0245", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0245", }, ], notes: [ { category: "general", text: "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0245", url: "https://www.suse.com/security/cve/CVE-2015-0245", }, { category: "external", summary: "SUSE Bug 1003898 for CVE-2015-0245", url: "https://bugzilla.suse.com/1003898", }, { category: "external", summary: "SUSE Bug 916343 for CVE-2015-0245", url: "https://bugzilla.suse.com/916343", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-0245", }, { cve: "CVE-2015-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1283", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1283", url: "https://www.suse.com/security/cve/CVE-2015-1283", }, { category: "external", summary: "SUSE Bug 1034050 for CVE-2015-1283", url: "https://bugzilla.suse.com/1034050", }, { category: "external", summary: "SUSE Bug 939077 for CVE-2015-1283", url: "https://bugzilla.suse.com/939077", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2015-1283", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 980391 for CVE-2015-1283", url: "https://bugzilla.suse.com/980391", }, { category: "external", summary: "SUSE Bug 983985 for CVE-2015-1283", url: "https://bugzilla.suse.com/983985", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-1283", }, { cve: "CVE-2015-2059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2059", }, ], notes: [ { category: "general", text: "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2059", url: "https://www.suse.com/security/cve/CVE-2015-2059", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-2059", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 919214 for CVE-2015-2059", url: "https://bugzilla.suse.com/919214", }, { category: "external", summary: "SUSE Bug 923241 for CVE-2015-2059", url: "https://bugzilla.suse.com/923241", }, { category: "external", summary: "SUSE Bug 937096 for CVE-2015-2059", url: "https://bugzilla.suse.com/937096", }, { category: "external", summary: "SUSE Bug 937097 for CVE-2015-2059", url: "https://bugzilla.suse.com/937097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-2059", }, { cve: "CVE-2015-2325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2325", }, ], notes: [ { category: "general", text: "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2325", url: "https://www.suse.com/security/cve/CVE-2015-2325", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2015-2325", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-2325", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2015-2325", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-2325", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2325", }, { cve: "CVE-2015-2327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2327", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2327", url: "https://www.suse.com/security/cve/CVE-2015-2327", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2327", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957567 for CVE-2015-2327", url: "https://bugzilla.suse.com/957567", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2327", }, { cve: "CVE-2015-2328", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2328", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2328", url: "https://www.suse.com/security/cve/CVE-2015-2328", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2328", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957600 for CVE-2015-2328", url: "https://bugzilla.suse.com/957600", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2328", }, { cve: "CVE-2015-3210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3210", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3210", url: "https://www.suse.com/security/cve/CVE-2015-3210", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-3210", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-3210", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3210", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-3210", }, { cve: "CVE-2015-3217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3217", }, ], notes: [ { category: "general", text: "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3217", url: "https://www.suse.com/security/cve/CVE-2015-3217", }, { category: "external", summary: "SUSE Bug 933878 for CVE-2015-3217", url: "https://bugzilla.suse.com/933878", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3217", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-3217", }, { cve: "CVE-2015-3238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3238", }, ], notes: [ { category: "general", text: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3238", url: "https://www.suse.com/security/cve/CVE-2015-3238", }, { category: "external", summary: "SUSE Bug 1123794 for CVE-2015-3238", url: "https://bugzilla.suse.com/1123794", }, { category: "external", summary: "SUSE Bug 934920 for CVE-2015-3238", url: "https://bugzilla.suse.com/934920", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-3238", }, { cve: "CVE-2015-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3622", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3622", url: "https://www.suse.com/security/cve/CVE-2015-3622", }, { category: "external", summary: "SUSE Bug 929414 for CVE-2015-3622", url: "https://bugzilla.suse.com/929414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-3622", }, { cve: "CVE-2015-5073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5073", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5073", url: "https://www.suse.com/security/cve/CVE-2015-5073", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-5073", url: "https://bugzilla.suse.com/936227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-5073", }, { cve: "CVE-2015-5218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5218", }, ], notes: [ { category: "general", text: "Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5218", url: "https://www.suse.com/security/cve/CVE-2015-5218", }, { category: "external", summary: "SUSE Bug 949754 for CVE-2015-5218", url: "https://bugzilla.suse.com/949754", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-5218", }, { cve: "CVE-2015-5276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5276", }, ], notes: [ { category: "general", text: "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5276", url: "https://www.suse.com/security/cve/CVE-2015-5276", }, { category: "external", summary: "SUSE Bug 945842 for CVE-2015-5276", url: "https://bugzilla.suse.com/945842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-5276", }, { cve: "CVE-2015-7511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7511", }, ], notes: [ { category: "general", text: "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7511", url: "https://www.suse.com/security/cve/CVE-2015-7511", }, { category: "external", summary: "SUSE Bug 965902 for CVE-2015-7511", url: "https://bugzilla.suse.com/965902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-7511", }, { cve: "CVE-2015-8380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8380", }, ], notes: [ { category: "general", text: "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8380", url: "https://www.suse.com/security/cve/CVE-2015-8380", }, { category: "external", summary: "SUSE Bug 957566 for CVE-2015-8380", url: "https://bugzilla.suse.com/957566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2015-8380", }, { cve: "CVE-2015-8381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8381", }, ], notes: [ { category: "general", text: "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\\z(?|(?'R')(\\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8381", url: "https://www.suse.com/security/cve/CVE-2015-8381", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8381", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8381", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8381", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8381", }, { cve: "CVE-2015-8382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8382", }, ], notes: [ { category: "general", text: "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8382", url: "https://www.suse.com/security/cve/CVE-2015-8382", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8382", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8382", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8382", }, { cve: "CVE-2015-8383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8383", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8383", url: "https://www.suse.com/security/cve/CVE-2015-8383", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8383", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8383", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8383", }, { cve: "CVE-2015-8384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8384", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8384", url: "https://www.suse.com/security/cve/CVE-2015-8384", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8384", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8384", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8384", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8384", }, { cve: "CVE-2015-8385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8385", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?|(\\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8385", url: "https://www.suse.com/security/cve/CVE-2015-8385", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8385", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8385", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8385", }, { cve: "CVE-2015-8386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8386", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8386", url: "https://www.suse.com/security/cve/CVE-2015-8386", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8386", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8386", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8386", }, { cve: "CVE-2015-8387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8387", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8387", url: "https://www.suse.com/security/cve/CVE-2015-8387", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8387", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8387", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8387", }, { cve: "CVE-2015-8388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8388", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8388", url: "https://www.suse.com/security/cve/CVE-2015-8388", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-8388", url: "https://bugzilla.suse.com/936227", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8388", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8388", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8388", }, { cve: "CVE-2015-8389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8389", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8389", url: "https://www.suse.com/security/cve/CVE-2015-8389", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8389", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8389", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8389", }, { cve: "CVE-2015-8390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8390", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8390", url: "https://www.suse.com/security/cve/CVE-2015-8390", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8390", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8390", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8390", }, { cve: "CVE-2015-8391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8391", }, ], notes: [ { category: "general", text: "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8391", url: "https://www.suse.com/security/cve/CVE-2015-8391", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8391", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8391", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8391", }, { cve: "CVE-2015-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8392", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8392", url: "https://www.suse.com/security/cve/CVE-2015-8392", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8392", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8392", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8392", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8392", }, { cve: "CVE-2015-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8393", }, ], notes: [ { category: "general", text: "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8393", url: "https://www.suse.com/security/cve/CVE-2015-8393", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8393", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8393", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8393", }, { cve: "CVE-2015-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8394", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8394", url: "https://www.suse.com/security/cve/CVE-2015-8394", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8394", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8394", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8394", }, { cve: "CVE-2015-8395", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8395", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8395", url: "https://www.suse.com/security/cve/CVE-2015-8395", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8395", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8395", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8395", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8395", }, { cve: "CVE-2015-8806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8806", }, ], notes: [ { category: "general", text: "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8806", url: "https://www.suse.com/security/cve/CVE-2015-8806", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2015-8806", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 965283 for CVE-2015-8806", url: "https://bugzilla.suse.com/965283", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2015-8806", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8806", }, { cve: "CVE-2015-8842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8842", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8842", url: "https://www.suse.com/security/cve/CVE-2015-8842", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2015-8842", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8842", }, { cve: "CVE-2015-8853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8853", }, ], notes: [ { category: "general", text: "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8853", url: "https://www.suse.com/security/cve/CVE-2015-8853", }, { category: "external", summary: "SUSE Bug 976584 for CVE-2015-8853", url: "https://bugzilla.suse.com/976584", }, { category: "external", summary: "SUSE Bug 997948 for CVE-2015-8853", url: "https://bugzilla.suse.com/997948", }, { category: "external", summary: "SUSE Bug 997950 for CVE-2015-8853", url: "https://bugzilla.suse.com/997950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8853", }, { cve: "CVE-2015-8948", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8948", }, ], notes: [ { category: "general", text: "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8948", url: "https://www.suse.com/security/cve/CVE-2015-8948", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2015-8948", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-8948", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2015-8948", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2015-8948", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8948", }, { cve: "CVE-2016-0634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0634", }, ], notes: [ { category: "general", text: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0634", url: "https://www.suse.com/security/cve/CVE-2016-0634", }, { category: "external", summary: "SUSE Bug 1000396 for CVE-2016-0634", url: "https://bugzilla.suse.com/1000396", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-0634", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-0634", url: "https://bugzilla.suse.com/1159416", }, { category: "external", summary: "SUSE Bug 1188388 for CVE-2016-0634", url: "https://bugzilla.suse.com/1188388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0634", }, { cve: "CVE-2016-0718", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0718", }, ], notes: [ { category: "general", text: "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0718", url: "https://www.suse.com/security/cve/CVE-2016-0718", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2016-0718", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 991809 for CVE-2016-0718", url: "https://bugzilla.suse.com/991809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0718", }, { cve: "CVE-2016-0787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0787", }, ], notes: [ { category: "general", text: "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0787", url: "https://www.suse.com/security/cve/CVE-2016-0787", }, { category: "external", summary: "SUSE Bug 1149968 for CVE-2016-0787", url: "https://bugzilla.suse.com/1149968", }, { category: "external", summary: "SUSE Bug 967026 for CVE-2016-0787", url: "https://bugzilla.suse.com/967026", }, { category: "external", summary: "SUSE Bug 968174 for CVE-2016-0787", url: "https://bugzilla.suse.com/968174", }, { category: "external", summary: "SUSE Bug 974691 for CVE-2016-0787", url: "https://bugzilla.suse.com/974691", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0787", }, { cve: "CVE-2016-1234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1234", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1234", url: "https://www.suse.com/security/cve/CVE-2016-1234", }, { category: "external", summary: "SUSE Bug 1020940 for CVE-2016-1234", url: "https://bugzilla.suse.com/1020940", }, { category: "external", summary: "SUSE Bug 969727 for CVE-2016-1234", url: "https://bugzilla.suse.com/969727", }, { category: "external", summary: "SUSE Bug 988770 for CVE-2016-1234", url: "https://bugzilla.suse.com/988770", }, { category: "external", summary: "SUSE Bug 988782 for CVE-2016-1234", url: "https://bugzilla.suse.com/988782", }, { category: "external", summary: "SUSE Bug 989127 for CVE-2016-1234", url: "https://bugzilla.suse.com/989127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1234", }, { cve: "CVE-2016-1238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1238", }, ], notes: [ { category: "general", text: "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1238", url: "https://www.suse.com/security/cve/CVE-2016-1238", }, { category: "external", summary: "SUSE Bug 1108749 for CVE-2016-1238", url: "https://bugzilla.suse.com/1108749", }, { category: "external", summary: "SUSE Bug 1123389 for CVE-2016-1238", url: "https://bugzilla.suse.com/1123389", }, { category: "external", summary: "SUSE Bug 987887 for CVE-2016-1238", url: "https://bugzilla.suse.com/987887", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-1238", url: "https://bugzilla.suse.com/988311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1238", }, { cve: "CVE-2016-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1283", }, ], notes: [ { category: "general", text: "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1283", url: "https://www.suse.com/security/cve/CVE-2016-1283", }, { category: "external", summary: "SUSE Bug 960837 for CVE-2016-1283", url: "https://bugzilla.suse.com/960837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2016-1283", }, { cve: "CVE-2016-1762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1762", }, ], notes: [ { category: "general", text: "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1762", url: "https://www.suse.com/security/cve/CVE-2016-1762", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1762", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981040 for CVE-2016-1762", url: "https://bugzilla.suse.com/981040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1762", }, { cve: "CVE-2016-1833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1833", }, ], notes: [ { category: "general", text: "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1833", url: "https://www.suse.com/security/cve/CVE-2016-1833", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1833", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981108 for CVE-2016-1833", url: "https://bugzilla.suse.com/981108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1833", }, { cve: "CVE-2016-1834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1834", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1834", url: "https://www.suse.com/security/cve/CVE-2016-1834", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1834", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981041 for CVE-2016-1834", url: "https://bugzilla.suse.com/981041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1834", }, { cve: "CVE-2016-1835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1835", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1835", url: "https://www.suse.com/security/cve/CVE-2016-1835", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1835", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981109 for CVE-2016-1835", url: "https://bugzilla.suse.com/981109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1835", }, { cve: "CVE-2016-1837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1837", }, ], notes: [ { category: "general", text: "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1837", url: "https://www.suse.com/security/cve/CVE-2016-1837", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1837", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981111 for CVE-2016-1837", url: "https://bugzilla.suse.com/981111", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1837", }, { cve: "CVE-2016-1838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1838", }, ], notes: [ { category: "general", text: "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1838", url: "https://www.suse.com/security/cve/CVE-2016-1838", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1838", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981112 for CVE-2016-1838", url: "https://bugzilla.suse.com/981112", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1838", }, { cve: "CVE-2016-1839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1839", }, ], notes: [ { category: "general", text: "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1839", url: "https://www.suse.com/security/cve/CVE-2016-1839", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1839", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-1839", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2016-1839", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1839", }, { cve: "CVE-2016-1840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1840", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1840", url: "https://www.suse.com/security/cve/CVE-2016-1840", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1840", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981115 for CVE-2016-1840", url: "https://bugzilla.suse.com/981115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1840", }, { cve: "CVE-2016-2037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2037", }, ], notes: [ { category: "general", text: "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2037", url: "https://www.suse.com/security/cve/CVE-2016-2037", }, { category: "external", summary: "SUSE Bug 1028410 for CVE-2016-2037", url: "https://bugzilla.suse.com/1028410", }, { category: "external", summary: "SUSE Bug 963448 for CVE-2016-2037", url: "https://bugzilla.suse.com/963448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2037", }, { cve: "CVE-2016-2073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2073", }, ], notes: [ { category: "general", text: "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2073", url: "https://www.suse.com/security/cve/CVE-2016-2073", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-2073", url: "https://bugzilla.suse.com/963963", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2073", }, { cve: "CVE-2016-2105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2105", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2105", url: "https://www.suse.com/security/cve/CVE-2016-2105", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2105", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977614 for CVE-2016-2105", url: "https://bugzilla.suse.com/977614", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2105", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989902 for CVE-2016-2105", url: "https://bugzilla.suse.com/989902", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2105", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2105", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2105", }, { cve: "CVE-2016-2106", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2106", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2106", url: "https://www.suse.com/security/cve/CVE-2016-2106", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2106", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977615 for CVE-2016-2106", url: "https://bugzilla.suse.com/977615", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2106", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 979279 for CVE-2016-2106", url: "https://bugzilla.suse.com/979279", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2106", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2106", }, { cve: "CVE-2016-2107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2107", }, ], notes: [ { category: "general", text: "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2107", url: "https://www.suse.com/security/cve/CVE-2016-2107", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2107", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2107", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977616 for CVE-2016-2107", url: "https://bugzilla.suse.com/977616", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2107", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2107", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2107", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2107", }, { cve: "CVE-2016-2108", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2108", }, ], notes: [ { category: "general", text: "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2108", url: "https://www.suse.com/security/cve/CVE-2016-2108", }, { category: "external", summary: "SUSE Bug 1001502 for CVE-2016-2108", url: "https://bugzilla.suse.com/1001502", }, { category: "external", summary: "SUSE Bug 1004499 for CVE-2016-2108", url: "https://bugzilla.suse.com/1004499", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-2108", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-2108", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2108", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977617 for CVE-2016-2108", url: "https://bugzilla.suse.com/977617", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2108", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989345 for CVE-2016-2108", url: "https://bugzilla.suse.com/989345", }, { category: "external", summary: "SUSE Bug 996067 for CVE-2016-2108", url: "https://bugzilla.suse.com/996067", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2108", }, { cve: "CVE-2016-2109", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2109", }, ], notes: [ { category: "general", text: "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2109", url: "https://www.suse.com/security/cve/CVE-2016-2109", }, { category: "external", summary: "SUSE Bug 1015243 for CVE-2016-2109", url: "https://bugzilla.suse.com/1015243", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2109", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2109", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2109", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2109", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2109", }, { cve: "CVE-2016-2177", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2177", }, ], notes: [ { category: "general", text: "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2177", url: "https://www.suse.com/security/cve/CVE-2016-2177", }, { category: "external", summary: "SUSE Bug 982575 for CVE-2016-2177", url: "https://bugzilla.suse.com/982575", }, { category: "external", summary: "SUSE Bug 999075 for CVE-2016-2177", url: "https://bugzilla.suse.com/999075", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2177", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2177", }, { cve: "CVE-2016-2178", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2178", }, ], notes: [ { category: "general", text: "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2178", url: "https://www.suse.com/security/cve/CVE-2016-2178", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2178", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 983249 for CVE-2016-2178", url: "https://bugzilla.suse.com/983249", }, { category: "external", summary: "SUSE Bug 983519 for CVE-2016-2178", url: "https://bugzilla.suse.com/983519", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2178", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2178", }, { cve: "CVE-2016-2179", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2179", }, ], notes: [ { category: "general", text: "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2179", url: "https://www.suse.com/security/cve/CVE-2016-2179", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2179", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2179", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2179", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2179", }, { cve: "CVE-2016-2180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2180", }, ], notes: [ { category: "general", text: "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2180", url: "https://www.suse.com/security/cve/CVE-2016-2180", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-2180", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 990419 for CVE-2016-2180", url: "https://bugzilla.suse.com/990419", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2180", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2180", }, { cve: "CVE-2016-2181", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2181", }, ], notes: [ { category: "general", text: "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2181", url: "https://www.suse.com/security/cve/CVE-2016-2181", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2181", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994749 for CVE-2016-2181", url: "https://bugzilla.suse.com/994749", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2181", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2181", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2181", }, { cve: "CVE-2016-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2182", }, ], notes: [ { category: "general", text: "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2182", url: "https://www.suse.com/security/cve/CVE-2016-2182", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2182", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 993819 for CVE-2016-2182", url: "https://bugzilla.suse.com/993819", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2182", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995959 for CVE-2016-2182", url: "https://bugzilla.suse.com/995959", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2182", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2182", }, { cve: "CVE-2016-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2183", }, ], notes: [ { category: "general", text: "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2183", url: "https://www.suse.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "SUSE Bug 1001912 for CVE-2016-2183", url: "https://bugzilla.suse.com/1001912", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-2183", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1027038 for CVE-2016-2183", url: "https://bugzilla.suse.com/1027038", }, { category: "external", summary: "SUSE Bug 1034689 for CVE-2016-2183", url: "https://bugzilla.suse.com/1034689", }, { category: "external", summary: "SUSE Bug 1056614 for CVE-2016-2183", url: "https://bugzilla.suse.com/1056614", }, { category: "external", summary: "SUSE Bug 1171693 for CVE-2016-2183", url: "https://bugzilla.suse.com/1171693", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2183", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995359 for CVE-2016-2183", url: "https://bugzilla.suse.com/995359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2183", }, { cve: "CVE-2016-2381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2381", }, ], notes: [ { category: "general", text: "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2381", url: "https://www.suse.com/security/cve/CVE-2016-2381", }, { category: "external", summary: "SUSE Bug 967082 for CVE-2016-2381", url: "https://bugzilla.suse.com/967082", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2016-2381", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2381", }, { cve: "CVE-2016-3075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3075", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3075", url: "https://www.suse.com/security/cve/CVE-2016-3075", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3075", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 973164 for CVE-2016-3075", url: "https://bugzilla.suse.com/973164", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3075", }, { cve: "CVE-2016-3191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3191", }, ], notes: [ { category: "general", text: "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3191", url: "https://www.suse.com/security/cve/CVE-2016-3191", }, { category: "external", summary: "SUSE Bug 971741 for CVE-2016-3191", url: "https://bugzilla.suse.com/971741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3191", }, { cve: "CVE-2016-3627", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3627", }, ], notes: [ { category: "general", text: "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3627", url: "https://www.suse.com/security/cve/CVE-2016-3627", }, { category: "external", summary: "SUSE Bug 1026099 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026099", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3627", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 972335 for CVE-2016-3627", url: "https://bugzilla.suse.com/972335", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3627", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-3627", }, { cve: "CVE-2016-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3705", }, ], notes: [ { category: "general", text: "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3705", url: "https://www.suse.com/security/cve/CVE-2016-3705", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-3705", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3705", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3705", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3705", }, { cve: "CVE-2016-3706", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3706", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3706", url: "https://www.suse.com/security/cve/CVE-2016-3706", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3706", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980483 for CVE-2016-3706", url: "https://bugzilla.suse.com/980483", }, { category: "external", summary: "SUSE Bug 997423 for CVE-2016-3706", url: "https://bugzilla.suse.com/997423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-3706", }, { cve: "CVE-2016-4008", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4008", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4008", url: "https://www.suse.com/security/cve/CVE-2016-4008", }, { category: "external", summary: "SUSE Bug 982779 for CVE-2016-4008", url: "https://bugzilla.suse.com/982779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4008", }, { cve: "CVE-2016-4429", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4429", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4429", url: "https://www.suse.com/security/cve/CVE-2016-4429", }, { category: "external", summary: "SUSE Bug 1081556 for CVE-2016-4429", url: "https://bugzilla.suse.com/1081556", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-4429", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980854 for CVE-2016-4429", url: "https://bugzilla.suse.com/980854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-4429", }, { cve: "CVE-2016-4447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4447", }, ], notes: [ { category: "general", text: "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4447", url: "https://www.suse.com/security/cve/CVE-2016-4447", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4447", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981548 for CVE-2016-4447", url: "https://bugzilla.suse.com/981548", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4447", }, { cve: "CVE-2016-4448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4448", }, ], notes: [ { category: "general", text: "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4448", url: "https://www.suse.com/security/cve/CVE-2016-4448", }, { category: "external", summary: "SUSE Bug 1010299 for CVE-2016-4448", url: "https://bugzilla.suse.com/1010299", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4448", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981549 for CVE-2016-4448", url: "https://bugzilla.suse.com/981549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4448", }, { cve: "CVE-2016-4449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4449", }, ], notes: [ { category: "general", text: "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4449", url: "https://www.suse.com/security/cve/CVE-2016-4449", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4449", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981550 for CVE-2016-4449", url: "https://bugzilla.suse.com/981550", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4449", }, { cve: "CVE-2016-4483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4483", }, ], notes: [ { category: "general", text: "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4483", url: "https://www.suse.com/security/cve/CVE-2016-4483", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-4483", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4483", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 978395 for CVE-2016-4483", url: "https://bugzilla.suse.com/978395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-4483", }, { cve: "CVE-2016-4574", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4574", }, ], notes: [ { category: "general", text: "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4574", url: "https://www.suse.com/security/cve/CVE-2016-4574", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4574", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979261 for CVE-2016-4574", url: "https://bugzilla.suse.com/979261", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-4574", }, { cve: "CVE-2016-4579", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4579", }, ], notes: [ { category: "general", text: "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4579", url: "https://www.suse.com/security/cve/CVE-2016-4579", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4579", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979906 for CVE-2016-4579", url: "https://bugzilla.suse.com/979906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4579", }, { cve: "CVE-2016-4658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4658", }, ], notes: [ { category: "general", text: "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4658", url: "https://www.suse.com/security/cve/CVE-2016-4658", }, { category: "external", summary: "SUSE Bug 1005544 for CVE-2016-4658", url: "https://bugzilla.suse.com/1005544", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-4658", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-4658", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1078813 for CVE-2016-4658", url: "https://bugzilla.suse.com/1078813", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4658", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4658", }, { cve: "CVE-2016-5011", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5011", }, ], notes: [ { category: "general", text: "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5011", url: "https://www.suse.com/security/cve/CVE-2016-5011", }, { category: "external", summary: "SUSE Bug 988361 for CVE-2016-5011", url: "https://bugzilla.suse.com/988361", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-5011", }, { cve: "CVE-2016-5300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5300", }, ], notes: [ { category: "general", text: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5300", url: "https://www.suse.com/security/cve/CVE-2016-5300", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2016-5300", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-5300", }, { cve: "CVE-2016-5419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5419", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5419", url: "https://www.suse.com/security/cve/CVE-2016-5419", }, { category: "external", summary: "SUSE Bug 1033413 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033413", }, { category: "external", summary: "SUSE Bug 1033442 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033442", }, { category: "external", summary: "SUSE Bug 991389 for CVE-2016-5419", url: "https://bugzilla.suse.com/991389", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5419", }, { cve: "CVE-2016-5420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5420", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5420", url: "https://www.suse.com/security/cve/CVE-2016-5420", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-5420", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-5420", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5420", }, { cve: "CVE-2016-5421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5421", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5421", url: "https://www.suse.com/security/cve/CVE-2016-5421", }, { category: "external", summary: "SUSE Bug 991391 for CVE-2016-5421", url: "https://bugzilla.suse.com/991391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5421", }, { cve: "CVE-2016-6185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6185", }, ], notes: [ { category: "general", text: "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6185", url: "https://www.suse.com/security/cve/CVE-2016-6185", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-6185", url: "https://bugzilla.suse.com/988311", }, { category: "external", summary: "SUSE Bug 999993 for CVE-2016-6185", url: "https://bugzilla.suse.com/999993", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6185", }, { cve: "CVE-2016-6261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6261", }, ], notes: [ { category: "general", text: "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6261", url: "https://www.suse.com/security/cve/CVE-2016-6261", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6261", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6261", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 990190 for CVE-2016-6261", url: "https://bugzilla.suse.com/990190", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6261", }, { cve: "CVE-2016-6262", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6262", }, ], notes: [ { category: "general", text: "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6262", url: "https://www.suse.com/security/cve/CVE-2016-6262", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2016-6262", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6262", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2016-6262", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2016-6262", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6262", }, { cve: "CVE-2016-6263", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6263", }, ], notes: [ { category: "general", text: "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6263", url: "https://www.suse.com/security/cve/CVE-2016-6263", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6263", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 990191 for CVE-2016-6263", url: "https://bugzilla.suse.com/990191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6263", }, { cve: "CVE-2016-6302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6302", }, ], notes: [ { category: "general", text: "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6302", url: "https://www.suse.com/security/cve/CVE-2016-6302", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6302", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6302", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995324 for CVE-2016-6302", url: "https://bugzilla.suse.com/995324", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6302", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6302", }, { cve: "CVE-2016-6303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6303", }, ], notes: [ { category: "general", text: "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6303", url: "https://www.suse.com/security/cve/CVE-2016-6303", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6303", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-6303", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6303", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995377 for CVE-2016-6303", url: "https://bugzilla.suse.com/995377", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6303", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6303", }, { cve: "CVE-2016-6304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6304", }, ], notes: [ { category: "general", text: "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6304", url: "https://www.suse.com/security/cve/CVE-2016-6304", }, { category: "external", summary: "SUSE Bug 1001706 for CVE-2016-6304", url: "https://bugzilla.suse.com/1001706", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-6304", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6304", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1005579 for CVE-2016-6304", url: "https://bugzilla.suse.com/1005579", }, { category: "external", summary: "SUSE Bug 1021375 for CVE-2016-6304", url: "https://bugzilla.suse.com/1021375", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6304", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999666 for CVE-2016-6304", url: "https://bugzilla.suse.com/999666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6304", }, { cve: "CVE-2016-6306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6306", }, ], notes: [ { category: "general", text: "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6306", url: "https://www.suse.com/security/cve/CVE-2016-6306", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6306", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6306", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999668 for CVE-2016-6306", url: "https://bugzilla.suse.com/999668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6306", }, { cve: "CVE-2016-6313", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6313", }, ], notes: [ { category: "general", text: "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6313", url: "https://www.suse.com/security/cve/CVE-2016-6313", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2016-6313", url: "https://bugzilla.suse.com/1123792", }, { category: "external", summary: "SUSE Bug 994157 for CVE-2016-6313", url: "https://bugzilla.suse.com/994157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6313", }, { cve: "CVE-2016-6318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6318", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6318", url: "https://www.suse.com/security/cve/CVE-2016-6318", }, { category: "external", summary: "SUSE Bug 1123113 for CVE-2016-6318", url: "https://bugzilla.suse.com/1123113", }, { category: "external", summary: "SUSE Bug 992966 for CVE-2016-6318", url: "https://bugzilla.suse.com/992966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6318", }, { cve: "CVE-2016-7141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7141", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7141", url: "https://www.suse.com/security/cve/CVE-2016-7141", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-7141", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-7141", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7141", }, { cve: "CVE-2016-7167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7167", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7167", url: "https://www.suse.com/security/cve/CVE-2016-7167", }, { category: "external", summary: "SUSE Bug 998760 for CVE-2016-7167", url: "https://bugzilla.suse.com/998760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7167", }, { cve: "CVE-2016-7543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7543", }, ], notes: [ { category: "general", text: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7543", url: "https://www.suse.com/security/cve/CVE-2016-7543", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-7543", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-7543", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7543", }, { cve: "CVE-2016-7796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7796", }, ], notes: [ { category: "general", text: "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7796", url: "https://www.suse.com/security/cve/CVE-2016-7796", }, { category: "external", summary: "SUSE Bug 1001765 for CVE-2016-7796", url: "https://bugzilla.suse.com/1001765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7796", }, { cve: "CVE-2016-8615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8615", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8615", url: "https://www.suse.com/security/cve/CVE-2016-8615", }, { category: "external", summary: "SUSE Bug 1005633 for CVE-2016-8615", url: "https://bugzilla.suse.com/1005633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8615", }, { cve: "CVE-2016-8616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8616", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8616", url: "https://www.suse.com/security/cve/CVE-2016-8616", }, { category: "external", summary: "SUSE Bug 1005634 for CVE-2016-8616", url: "https://bugzilla.suse.com/1005634", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8616", }, { cve: "CVE-2016-8617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8617", }, ], notes: [ { category: "general", text: "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8617", url: "https://www.suse.com/security/cve/CVE-2016-8617", }, { category: "external", summary: "SUSE Bug 1005635 for CVE-2016-8617", url: "https://bugzilla.suse.com/1005635", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8617", }, { cve: "CVE-2016-8618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8618", }, ], notes: [ { category: "general", text: "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8618", url: "https://www.suse.com/security/cve/CVE-2016-8618", }, { category: "external", summary: "SUSE Bug 1005637 for CVE-2016-8618", url: "https://bugzilla.suse.com/1005637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8618", }, { cve: "CVE-2016-8619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8619", }, ], notes: [ { category: "general", text: "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8619", url: "https://www.suse.com/security/cve/CVE-2016-8619", }, { category: "external", summary: "SUSE Bug 1005638 for CVE-2016-8619", url: "https://bugzilla.suse.com/1005638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8619", }, { cve: "CVE-2016-8620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8620", }, ], notes: [ { category: "general", text: "The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8620", url: "https://www.suse.com/security/cve/CVE-2016-8620", }, { category: "external", summary: "SUSE Bug 1005640 for CVE-2016-8620", url: "https://bugzilla.suse.com/1005640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8620", }, { cve: "CVE-2016-8621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8621", }, ], notes: [ { category: "general", text: "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8621", url: "https://www.suse.com/security/cve/CVE-2016-8621", }, { category: "external", summary: "SUSE Bug 1005642 for CVE-2016-8621", url: "https://bugzilla.suse.com/1005642", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8621", }, { cve: "CVE-2016-8622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8622", }, ], notes: [ { category: "general", text: "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8622", url: "https://www.suse.com/security/cve/CVE-2016-8622", }, { category: "external", summary: "SUSE Bug 1005643 for CVE-2016-8622", url: "https://bugzilla.suse.com/1005643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8622", }, { cve: "CVE-2016-8623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8623", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8623", url: "https://www.suse.com/security/cve/CVE-2016-8623", }, { category: "external", summary: "SUSE Bug 1005645 for CVE-2016-8623", url: "https://bugzilla.suse.com/1005645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8623", }, { cve: "CVE-2016-8624", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8624", }, ], notes: [ { category: "general", text: "curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8624", url: "https://www.suse.com/security/cve/CVE-2016-8624", }, { category: "external", summary: "SUSE Bug 1005646 for CVE-2016-8624", url: "https://bugzilla.suse.com/1005646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8624", }, { cve: "CVE-2016-9063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9063", }, ], notes: [ { category: "general", text: "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9063", url: "https://www.suse.com/security/cve/CVE-2016-9063", }, { category: "external", summary: "SUSE Bug 1009026 for CVE-2016-9063", url: "https://bugzilla.suse.com/1009026", }, { category: "external", summary: "SUSE Bug 1010424 for CVE-2016-9063", url: "https://bugzilla.suse.com/1010424", }, { category: "external", summary: "SUSE Bug 1047240 for CVE-2016-9063", url: "https://bugzilla.suse.com/1047240", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2016-9063", url: "https://bugzilla.suse.com/1123115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2016-9063", }, { cve: "CVE-2016-9318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9318", }, ], notes: [ { category: "general", text: "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9318", url: "https://www.suse.com/security/cve/CVE-2016-9318", }, { category: "external", summary: "SUSE Bug 1010675 for CVE-2016-9318", url: "https://bugzilla.suse.com/1010675", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9318", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1019074 for CVE-2016-9318", url: "https://bugzilla.suse.com/1019074", }, { category: "external", summary: "SUSE Bug 1118959 for CVE-2016-9318", url: "https://bugzilla.suse.com/1118959", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9318", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 1126613 for CVE-2016-9318", url: "https://bugzilla.suse.com/1126613", }, { category: "external", summary: "SUSE Bug 1148896 for CVE-2016-9318", url: "https://bugzilla.suse.com/1148896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9318", }, { cve: "CVE-2016-9586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9586", }, ], notes: [ { category: "general", text: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9586", url: "https://www.suse.com/security/cve/CVE-2016-9586", }, { category: "external", summary: "SUSE Bug 1015332 for CVE-2016-9586", url: "https://bugzilla.suse.com/1015332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9586", }, { cve: "CVE-2016-9597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9597", }, ], notes: [ { category: "general", text: "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9597", url: "https://www.suse.com/security/cve/CVE-2016-9597", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9597", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-9597", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9597", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9597", }, { cve: "CVE-2016-9840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9840", }, ], notes: [ { category: "general", text: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9840", url: "https://www.suse.com/security/cve/CVE-2016-9840", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9840", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9840", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9840", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9840", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9840", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9840", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9840", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9840", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9840", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9840", }, { cve: "CVE-2016-9841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9841", }, ], notes: [ { category: "general", text: "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9841", url: "https://www.suse.com/security/cve/CVE-2016-9841", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9841", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9841", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9841", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1064070 for CVE-2016-9841", url: "https://bugzilla.suse.com/1064070", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2016-9841", url: "https://bugzilla.suse.com/1070162", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9841", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9841", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9841", url: "https://bugzilla.suse.com/1127473", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9841", }, { cve: "CVE-2016-9842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9842", }, ], notes: [ { category: "general", text: "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9842", url: "https://www.suse.com/security/cve/CVE-2016-9842", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9842", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9842", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9842", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9842", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9842", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9842", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9842", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9842", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9842", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9842", }, { cve: "CVE-2016-9843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9843", }, ], notes: [ { category: "general", text: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9843", url: "https://www.suse.com/security/cve/CVE-2016-9843", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9843", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1013882 for CVE-2016-9843", url: "https://bugzilla.suse.com/1013882", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9843", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9843", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1116686 for CVE-2016-9843", url: "https://bugzilla.suse.com/1116686", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9843", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9843", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9843", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9843", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9843", }, { cve: "CVE-2017-1000100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000100", }, ], notes: [ { category: "general", text: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000100", url: "https://www.suse.com/security/cve/CVE-2017-1000100", }, { category: "external", summary: "SUSE Bug 1051644 for CVE-2017-1000100", url: "https://bugzilla.suse.com/1051644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-1000100", }, { cve: "CVE-2017-1000101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000101", }, ], notes: [ { category: "general", text: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000101", url: "https://www.suse.com/security/cve/CVE-2017-1000101", }, { category: "external", summary: "SUSE Bug 1051643 for CVE-2017-1000101", url: "https://bugzilla.suse.com/1051643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-1000101", }, { cve: "CVE-2017-1000366", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000366", }, ], notes: [ { category: "general", text: "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000366", url: "https://www.suse.com/security/cve/CVE-2017-1000366", }, { category: "external", summary: "SUSE Bug 1037551 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1037551", }, { category: "external", summary: "SUSE Bug 1039357 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1039357", }, { category: "external", summary: "SUSE Bug 1063847 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1063847", }, { category: "external", summary: "SUSE Bug 1071319 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1071319", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1123874", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-1000366", }, { cve: "CVE-2017-10684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10684", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10684", url: "https://www.suse.com/security/cve/CVE-2017-10684", }, { category: "external", summary: "SUSE Bug 1046858 for CVE-2017-10684", url: "https://bugzilla.suse.com/1046858", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10684", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10684", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-10684", }, { cve: "CVE-2017-10685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10685", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10685", url: "https://www.suse.com/security/cve/CVE-2017-10685", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-10685", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10685", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10685", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-10685", }, { cve: "CVE-2017-11112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11112", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11112", url: "https://www.suse.com/security/cve/CVE-2017-11112", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11112", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047964 for CVE-2017-11112", url: "https://bugzilla.suse.com/1047964", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11112", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-11112", }, { cve: "CVE-2017-11113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11113", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11113", url: "https://www.suse.com/security/cve/CVE-2017-11113", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11113", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047965 for CVE-2017-11113", url: "https://bugzilla.suse.com/1047965", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11113", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-11113", }, { cve: "CVE-2017-2616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2616", }, ], notes: [ { category: "general", text: "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2616", url: "https://www.suse.com/security/cve/CVE-2017-2616", }, { category: "external", summary: "SUSE Bug 1023041 for CVE-2017-2616", url: "https://bugzilla.suse.com/1023041", }, { category: "external", summary: "SUSE Bug 1123789 for CVE-2017-2616", url: "https://bugzilla.suse.com/1123789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-2616", }, { cve: "CVE-2017-6507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6507", }, ], notes: [ { category: "general", text: "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6507", url: "https://www.suse.com/security/cve/CVE-2017-6507", }, { category: "external", summary: "SUSE Bug 1029696 for CVE-2017-6507", url: "https://bugzilla.suse.com/1029696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-6507", }, { cve: "CVE-2017-7407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7407", }, ], notes: [ { category: "general", text: "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7407", url: "https://www.suse.com/security/cve/CVE-2017-7407", }, { category: "external", summary: "SUSE Bug 1032309 for CVE-2017-7407", url: "https://bugzilla.suse.com/1032309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-7407", }, { cve: "CVE-2017-7526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7526", }, ], notes: [ { category: "general", text: "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7526", url: "https://www.suse.com/security/cve/CVE-2017-7526", }, { category: "external", summary: "SUSE Bug 1046607 for CVE-2017-7526", url: "https://bugzilla.suse.com/1046607", }, { category: "external", summary: "SUSE Bug 1047462 for CVE-2017-7526", url: "https://bugzilla.suse.com/1047462", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2017-7526", url: "https://bugzilla.suse.com/1123792", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-7526", }, { cve: "CVE-2017-9047", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9047", }, ], notes: [ { category: "general", text: "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9047", url: "https://www.suse.com/security/cve/CVE-2017-9047", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039657 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039657", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9047", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-9047", }, { cve: "CVE-2017-9048", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9048", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9048", url: "https://www.suse.com/security/cve/CVE-2017-9048", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039658 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-9048", }, { cve: "CVE-2017-9049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9049", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9049", url: "https://www.suse.com/security/cve/CVE-2017-9049", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039659 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039659", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9049", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9049", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9049", }, { cve: "CVE-2017-9050", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9050", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9050", url: "https://www.suse.com/security/cve/CVE-2017-9050", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9050", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9050", }, { cve: "CVE-2017-9233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9233", }, ], notes: [ { category: "general", text: "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9233", url: "https://www.suse.com/security/cve/CVE-2017-9233", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9233", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1047236 for CVE-2017-9233", url: "https://bugzilla.suse.com/1047236", }, { category: "external", summary: "SUSE Bug 1073350 for CVE-2017-9233", url: "https://bugzilla.suse.com/1073350", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2017-9233", url: "https://bugzilla.suse.com/1123115", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2017-9233", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9233", }, ], }
cve-2016-7141
Vulnerability from cvelistv5
Published
2016-10-03 21:00
Modified
2024-08-06 01:50
Severity ?
EPSS score ?
Summary
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
References
â–Ľ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-2575.html | vendor-advisory, x_refsource_REDHAT | |
https://curl.haxx.se/docs/adv_20160907.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=1373229 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1036739 | vdb-entry, x_refsource_SECTRACK | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html | mailing-list, x_refsource_MLIST | |
https://github.com/curl/curl/commit/curl-7_50_2~32 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-2957.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/92754 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201701-47 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:50:47.499Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2016:2575", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20160907.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1373229", }, { name: "1036739", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036739", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/curl/curl/commit/curl-7_50_2~32", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "92754", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92754", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-07T00:00:00", descriptions: [ { lang: "en", value: "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2016:2575", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20160907.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1373229", }, { name: "1036739", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036739", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/curl/curl/commit/curl-7_50_2~32", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "92754", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92754", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-7141", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2016:2575", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { name: "https://curl.haxx.se/docs/adv_20160907.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20160907.html", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1373229", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1373229", }, { name: "1036739", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036739", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { name: "https://github.com/curl/curl/commit/curl-7_50_2~32", refsource: "CONFIRM", url: "https://github.com/curl/curl/commit/curl-7_50_2~32", }, { name: "openSUSE-SU-2016:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "92754", refsource: "BID", url: "http://www.securityfocus.com/bid/92754", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-7141", datePublished: "2016-10-03T21:00:00", dateReserved: "2016-09-05T00:00:00", dateUpdated: "2024-08-06T01:50:47.499Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-9047
Vulnerability from cvelistv5
Published
2017-05-18 06:13
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98599 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2017/dsa-3952 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201711-01 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2017/05/15/1 | x_refsource_MISC | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:21.859Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "98599", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98599", }, { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-18T00:00:00", descriptions: [ { lang: "en", value: "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:09:55", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "98599", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98599", }, { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9047", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "98599", refsource: "BID", url: "http://www.securityfocus.com/bid/98599", }, { name: "DSA-3952", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201711-01", }, { name: "http://www.openwall.com/lists/oss-security/2017/05/15/1", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9047", datePublished: "2017-05-18T06:13:00", dateReserved: "2017-05-18T00:00:00", dateUpdated: "2024-08-05T16:55:21.859Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-1283
Vulnerability from cvelistv5
Published
2015-07-23 00:00
Modified
2024-08-06 04:40
Severity ?
EPSS score ?
Summary
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:40:17.858Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2015:1499", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1499.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://code.google.com/p/chromium/issues/detail?id=492052", }, { name: "openSUSE-SU-2016:1523", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", }, { name: "openSUSE-SU-2015:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html", }, { name: "1033031", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033031", }, { name: "DSA-3318", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3318", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "SUSE-SU-2016:1508", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "GLSA-201603-09", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201603-09", }, { name: "SUSE-SU-2016:1512", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://codereview.chromium.org/1224303003", }, { name: "75973", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/75973", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html", }, { name: "USN-2726-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2726-1", }, { name: "openSUSE-SU-2016:1441", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", }, { name: "DSA-3315", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3315", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-07-21T00:00:00", descriptions: [ { lang: "en", value: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-31T07:06:31", orgId: "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", shortName: "Chrome", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2015:1499", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1499.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://code.google.com/p/chromium/issues/detail?id=492052", }, { name: "openSUSE-SU-2016:1523", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", }, { name: "openSUSE-SU-2015:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html", }, { name: "1033031", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033031", }, { name: "DSA-3318", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3318", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "SUSE-SU-2016:1508", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "GLSA-201603-09", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201603-09", }, { name: "SUSE-SU-2016:1512", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://codereview.chromium.org/1224303003", }, { name: "75973", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/75973", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html", }, { name: "USN-2726-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2726-1", }, { name: "openSUSE-SU-2016:1441", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", }, { name: "DSA-3315", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3315", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "chrome-cve-admin@google.com", ID: "CVE-2015-1283", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.tenable.com/security/tns-2016-20", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2015:1499", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-1499.html", }, { name: "https://code.google.com/p/chromium/issues/detail?id=492052", refsource: "CONFIRM", url: "https://code.google.com/p/chromium/issues/detail?id=492052", }, { name: "openSUSE-SU-2016:1523", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", }, { name: "openSUSE-SU-2015:1287", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html", }, { name: "1033031", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033031", }, { name: "DSA-3318", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3318", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "SUSE-SU-2016:1508", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", }, { name: "GLSA-201701-21", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-21", }, { name: "https://source.android.com/security/bulletin/2016-11-01.html", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "GLSA-201603-09", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201603-09", }, { name: "SUSE-SU-2016:1512", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", }, { name: "https://codereview.chromium.org/1224303003", refsource: "CONFIRM", url: "https://codereview.chromium.org/1224303003", }, { name: "75973", refsource: "BID", url: "http://www.securityfocus.com/bid/75973", }, { name: "http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html", refsource: "CONFIRM", url: "http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html", }, { name: "USN-2726-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2726-1", }, { name: "openSUSE-SU-2016:1441", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", }, { name: "DSA-3315", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3315", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", assignerShortName: "Chrome", cveId: "CVE-2015-1283", datePublished: "2015-07-23T00:00:00", dateReserved: "2015-01-21T00:00:00", dateUpdated: "2024-08-06T04:40:17.858Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8624
Vulnerability from cvelistv5
Published
2018-07-31 21:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:41.205Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102J.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94103", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94103", }, { name: "[pulsar-commits] 20200914 [GitHub] [pulsar] klwilson227 opened a new issue #8061: CVE-2017-14063", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:08:18", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", ], url: "https://curl.haxx.se/docs/adv_20161102J.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94103", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94103", }, { name: "[pulsar-commits] 20200914 [GitHub] [pulsar] klwilson227 opened a new issue #8061: CVE-2017-14063", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8624", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", }, ], }, impact: { cvss: [ [ { vectorString: "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, ], [ { vectorString: "4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://curl.haxx.se/docs/adv_20161102J.html", refsource: "MISC", url: "https://curl.haxx.se/docs/adv_20161102J.html", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94103", refsource: "BID", url: "http://www.securityfocus.com/bid/94103", }, { name: "[pulsar-commits] 20200914 [GitHub] [pulsar] klwilson227 opened a new issue #8061: CVE-2017-14063", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8624", datePublished: "2018-07-31T21:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:41.205Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8620
Vulnerability from cvelistv5
Published
2018-08-01 06:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/94102 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://curl.haxx.se/docs/adv_20161102F.html | x_refsource_CONFIRM | |
https://www.tenable.com/security/tns-2016-21 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037192 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201701-47 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:40.910Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "94102", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94102", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102F.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "94102", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94102", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102F.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8620", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", }, ], }, impact: { cvss: [ [ { vectorString: "6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, ], [ { vectorString: "5.8/AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-120", }, ], }, ], }, references: { reference_data: [ { name: "94102", refsource: "BID", url: "http://www.securityfocus.com/bid/94102", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://curl.haxx.se/docs/adv_20161102F.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102F.html", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8620", datePublished: "2018-08-01T06:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:40.910Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-2059
Vulnerability from cvelistv5
Published
2015-08-12 14:00
Modified
2024-08-06 05:02
Severity ?
EPSS score ?
Summary
The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
References
â–Ľ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html | vendor-advisory, x_refsource_FEDORA | |
http://www.debian.org/security/2016/dsa-3578 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html | vendor-advisory, x_refsource_SUSE | |
https://github.com/jabberd2/jabberd2/issues/85 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html | vendor-advisory, x_refsource_SUSE | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/72736 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/02/23/25 | mailing-list, x_refsource_MLIST | |
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279 | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-3068-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:02:43.426Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2015-11621", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html", }, { name: "DSA-3578", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3578", }, { name: "openSUSE-SU-2015:1261", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/jabberd2/jabberd2/issues/85", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "FEDORA-2015-11562", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html", }, { name: "72736", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/72736", }, { name: "[oss-security] 20150223 Re: CVE Request: jabberd remote information disclosure", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/02/23/25", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-10-22T00:00:00", descriptions: [ { lang: "en", value: "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-29T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "FEDORA-2015-11621", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html", }, { name: "DSA-3578", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3578", }, { name: "openSUSE-SU-2015:1261", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/jabberd2/jabberd2/issues/85", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "FEDORA-2015-11562", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html", }, { name: "72736", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/72736", }, { name: "[oss-security] 20150223 Re: CVE Request: jabberd remote information disclosure", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/02/23/25", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-2059", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2015-11621", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html", }, { name: "DSA-3578", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3578", }, { name: "openSUSE-SU-2015:1261", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html", }, { name: "https://github.com/jabberd2/jabberd2/issues/85", refsource: "CONFIRM", url: "https://github.com/jabberd2/jabberd2/issues/85", }, { name: "openSUSE-SU-2016:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "FEDORA-2015-11562", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html", }, { name: "72736", refsource: "BID", url: "http://www.securityfocus.com/bid/72736", }, { name: "[oss-security] 20150223 Re: CVE Request: jabberd remote information disclosure", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/02/23/25", }, { name: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279", refsource: "CONFIRM", url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279", }, { name: "USN-3068-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3068-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-2059", datePublished: "2015-08-12T14:00:00", dateReserved: "2015-02-23T00:00:00", dateUpdated: "2024-08-06T05:02:43.426Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8391
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.678Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "82990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/82990", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "82990", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/82990", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8391", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.678Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2179
Vulnerability from cvelistv5
Published
2016-09-16 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.748Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "1036689", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036689", }, { name: "92987", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/92987", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-22T00:00:00", descriptions: [ { lang: "en", value: "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "1036689", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036689", }, { name: "92987", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/92987", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2179", datePublished: "2016-09-16T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.748Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9586
Vulnerability from cvelistv5
Published
2018-04-23 18:00
Modified
2024-08-06 02:59
Severity ?
EPSS score ?
Summary
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:59:02.246Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161221A.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16", }, { name: "1037515", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037515", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "95019", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95019", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "redhat", versions: [ { status: "affected", version: "curl 7.52.0", }, ], }, ], datePublic: "2016-12-21T00:00:00", descriptions: [ { lang: "en", value: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:06:45", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161221A.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16", }, { name: "1037515", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037515", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "95019", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95019", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-9586", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "curl 7.52.0", }, ], }, }, ], }, vendor_name: "redhat", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", }, ], }, impact: { cvss: [ [ { vectorString: "5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], [ { vectorString: "2.6/AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { name: "https://curl.haxx.se/docs/adv_20161221A.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161221A.html", }, { name: "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16", refsource: "CONFIRM", url: "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16", }, { name: "1037515", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037515", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "95019", refsource: "BID", url: "http://www.securityfocus.com/bid/95019", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-9586", datePublished: "2018-04-23T18:00:00", dateReserved: "2016-11-23T00:00:00", dateUpdated: "2024-08-06T02:59:02.246Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8842
Vulnerability from cvelistv5
Published
2016-04-20 16:00
Modified
2024-08-06 08:29
Severity ?
EPSS score ?
Summary
tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.
References
â–Ľ | URL | Tags |
---|---|---|
https://github.com/systemd/systemd/commit/afae249efa4774c6676738ac5de6aeb4daf4889f | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2016/04/08/15 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2016/04/08/14 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.suse.com/show_bug.cgi?id=972612 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:29:22.054Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/systemd/systemd/commit/afae249efa4774c6676738ac5de6aeb4daf4889f", }, { name: "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/15", }, { name: "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/14", }, { name: "openSUSE-SU-2016:1414", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html", }, { name: "openSUSE-SU-2016:1101", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=972612", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-29T00:00:00", descriptions: [ { lang: "en", value: "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:15:52", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/systemd/systemd/commit/afae249efa4774c6676738ac5de6aeb4daf4889f", }, { name: "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/15", }, { name: "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/14", }, { name: "openSUSE-SU-2016:1414", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html", }, { name: "openSUSE-SU-2016:1101", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=972612", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@microfocus.com", ID: "CVE-2015-8842", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/systemd/systemd/commit/afae249efa4774c6676738ac5de6aeb4daf4889f", refsource: "CONFIRM", url: "https://github.com/systemd/systemd/commit/afae249efa4774c6676738ac5de6aeb4daf4889f", }, { name: "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/04/08/15", }, { name: "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/04/08/14", }, { name: "openSUSE-SU-2016:1414", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html", }, { name: "openSUSE-SU-2016:1101", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html", }, { name: "https://bugzilla.suse.com/show_bug.cgi?id=972612", refsource: "CONFIRM", url: "https://bugzilla.suse.com/show_bug.cgi?id=972612", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2015-8842", datePublished: "2016-04-20T16:00:00", dateReserved: "2016-04-08T00:00:00", dateUpdated: "2024-08-06T08:29:22.054Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9841
Vulnerability from cvelistv5
Published
2017-05-23 03:56
Modified
2024-08-06 02:59
Severity ?
EPSS score ?
Summary
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:59:03.536Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "1039596", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039596", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402346", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20171019-0001/", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-30T00:00:00", descriptions: [ { lang: "en", value: "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:16:00", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "1039596", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039596", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402346", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20171019-0001/", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@microfocus.com", ID: "CVE-2016-9841", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2017:1221", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", refsource: "BID", url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "1039596", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039596", }, { name: "GLSA-201701-56", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4292-1/", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "https://support.apple.com/HT208144", refsource: "CONFIRM", url: "https://support.apple.com/HT208144", }, { name: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", refsource: "MISC", url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { name: "https://support.apple.com/HT208113", refsource: "CONFIRM", url: "https://support.apple.com/HT208113", }, { name: "https://support.apple.com/HT208112", refsource: "CONFIRM", url: "https://support.apple.com/HT208112", }, { name: "https://support.apple.com/HT208115", refsource: "CONFIRM", url: "https://support.apple.com/HT208115", }, { name: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", refsource: "MISC", url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1402346", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402346", }, { name: "https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb", refsource: "CONFIRM", url: "https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb", }, { name: "https://security.netapp.com/advisory/ntap-20171019-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20171019-0001/", }, { name: "GLSA-202007-54", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202007-54", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2016-9841", datePublished: "2017-05-23T03:56:00", dateReserved: "2016-12-05T00:00:00", dateUpdated: "2024-08-06T02:59:03.536Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8386
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.538Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "82990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/82990", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "82990", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/82990", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8386", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.538Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-6277
Vulnerability from cvelistv5
Published
2014-09-27 22:00
Modified
2024-08-06 12:10
Severity ?
EPSS score ?
Summary
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:10:13.286Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2380-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61703", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61641", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60325", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61485", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60055", }, { name: "59961", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59961", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-27T00:00:00", descriptions: [ { lang: "en", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-08-08T09:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2380-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61703", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61641", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60325", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61485", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61312", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60055", }, { name: "59961", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59961", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2014-6277", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3093", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2380-1", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", refsource: "SECUNIA", url: "http://secunia.com/advisories/60325", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3094", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "HPSBMU03236", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "61780", refsource: "SECUNIA", url: "http://secunia.com/advisories/61780", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", refsource: "SECUNIA", url: "http://secunia.com/advisories/61471", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "59961", refsource: "SECUNIA", url: "http://secunia.com/advisories/59961", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "http://support.novell.com/security/cve/CVE-2014-6277.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2014-6277", datePublished: "2014-09-27T22:00:00", dateReserved: "2014-09-09T00:00:00", dateUpdated: "2024-08-06T12:10:13.286Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8388
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | x_refsource_CONFIRM | |
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-1025.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/85576 | vdb-entry, x_refsource_BID | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.883Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "85576", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/85576", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "85576", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/85576", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8388", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "85576", refsource: "BID", url: "http://www.securityfocus.com/bid/85576", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8388", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.883Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8621
Vulnerability from cvelistv5
Published
2018-07-31 22:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
References
â–Ľ | URL | Tags |
---|---|---|
https://curl.haxx.se/docs/adv_20161102G.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621 | x_refsource_CONFIRM | |
https://www.tenable.com/security/tns-2016-21 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037192 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM | |
https://curl.haxx.se/CVE-2016-8621.patch | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:2486 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201701-47 | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/94101 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:41.134Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102G.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/CVE-2016-8621.patch", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94101", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94101", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102G.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/CVE-2016-8621.patch", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94101", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94101", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8621", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", }, ], }, impact: { cvss: [ [ { vectorString: "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, ], [ { vectorString: "4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://curl.haxx.se/docs/adv_20161102G.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102G.html", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://curl.haxx.se/CVE-2016-8621.patch", refsource: "CONFIRM", url: "https://curl.haxx.se/CVE-2016-8621.patch", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94101", refsource: "BID", url: "http://www.securityfocus.com/bid/94101", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8621", datePublished: "2018-07-31T22:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:41.134Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8390
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.878Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8390", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.878Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2181
Vulnerability from cvelistv5
Published
2016-09-16 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.606Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "92982", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/92982", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1036690", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036690", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=1fb9fdc3027b27d8eb6a1e6a846435b070980770", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/csp/article/K59298921", }, { name: "DSA-3673", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-19T00:00:00", descriptions: [ { lang: "en", value: "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "92982", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/92982", }, { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1036690", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036690", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=1fb9fdc3027b27d8eb6a1e6a846435b070980770", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { url: "https://support.f5.com/csp/article/K59298921", }, { name: "DSA-3673", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2181", datePublished: "2016-09-16T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.606Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0245
Vulnerability from cvelistv5
Published
2015-02-13 15:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2015/dsa-3161 | vendor-advisory, x_refsource_DEBIAN | |
http://www.openwall.com/lists/oss-security/2015/02/09/6 | mailing-list, x_refsource_MLIST | |
http://advisories.mageia.org/MGASA-2015-0071.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 | vendor-advisory, x_refsource_MANDRIVA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.538Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "openSUSE-SU-2015:0300", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html", }, { name: "DSA-3161", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3161", }, { name: "[oss-security] 20150209 CVE-2015-0245: denial of service in dbus >= 1.4 systemd activation", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/02/09/6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2015-0071.html", }, { name: "MDVSA-2015:176", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:176", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-02-09T00:00:00", descriptions: [ { lang: "en", value: "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-16T20:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "openSUSE-SU-2015:0300", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html", }, { name: "DSA-3161", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3161", }, { name: "[oss-security] 20150209 CVE-2015-0245: denial of service in dbus >= 1.4 systemd activation", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/02/09/6", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2015-0071.html", }, { name: "MDVSA-2015:176", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:176", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0245", datePublished: "2015-02-13T15:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.538Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-5218
Vulnerability from cvelistv5
Published
2015-11-09 16:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
References
â–Ľ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html | vendor-advisory, x_refsource_SUSE | |
http://www.spinics.net/lists/util-linux-ng/msg11873.html | mailing-list, x_refsource_MLIST | |
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1259322 | x_refsource_CONFIRM | |
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec | x_refsource_CONFIRM | |
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T06:41:08.934Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2015:1910", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html", }, { name: "[util-linux] 20150807 crash in colcrt", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.spinics.net/lists/util-linux-ng/msg11873.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1259322", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-08-07T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2015-11-09T15:57:02", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openSUSE-SU-2015:1910", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html", }, { name: "[util-linux] 20150807 crash in colcrt", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.spinics.net/lists/util-linux-ng/msg11873.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1259322", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2015-5218", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2015:1910", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html", }, { name: "[util-linux] 20150807 crash in colcrt", refsource: "MLIST", url: "http://www.spinics.net/lists/util-linux-ng/msg11873.html", }, { name: "https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8", refsource: "CONFIRM", url: "https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1259322", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1259322", }, { name: "https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec", refsource: "CONFIRM", url: "https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec", }, { name: "https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes", refsource: "CONFIRM", url: "https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-5218", datePublished: "2015-11-09T16:00:00", dateReserved: "2015-07-01T00:00:00", dateUpdated: "2024-08-06T06:41:08.934Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6507
Vulnerability from cvelistv5
Published
2017-03-24 06:56
Modified
2024-08-05 15:33
Severity ?
EPSS score ?
Summary
An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
References
â–Ľ | URL | Tags |
---|---|---|
http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/97223 | vdb-entry, x_refsource_BID | |
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6507.html | x_refsource_CONFIRM | |
https://bugs.launchpad.net/apparmor/+bug/1668892 | x_refsource_CONFIRM | |
http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:33:20.013Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648", }, { name: "97223", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/97223", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6507.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.launchpad.net/apparmor/+bug/1668892", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-03-24T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-03-31T09:57:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648", }, { name: "97223", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/97223", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6507.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.launchpad.net/apparmor/+bug/1668892", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-6507", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648", refsource: "CONFIRM", url: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648", }, { name: "97223", refsource: "BID", url: "http://www.securityfocus.com/bid/97223", }, { name: "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6507.html", refsource: "CONFIRM", url: "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6507.html", }, { name: "https://bugs.launchpad.net/apparmor/+bug/1668892", refsource: "CONFIRM", url: "https://bugs.launchpad.net/apparmor/+bug/1668892", }, { name: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647", refsource: "CONFIRM", url: "http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-6507", datePublished: "2017-03-24T06:56:00", dateReserved: "2017-03-07T00:00:00", dateUpdated: "2024-08-05T15:33:20.013Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4008
Vulnerability from cvelistv5
Published
2016-05-05 18:00
Modified
2024-08-06 00:17
Severity ?
EPSS score ?
Summary
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:17:30.800Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201703-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201703-05", }, { name: "FEDORA-2016-048ffb6235", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625", }, { name: "USN-2957-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2957-2", }, { name: "FEDORA-2016-383b8250e6", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html", }, { name: "openSUSE-SU-2016:1567", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html", }, { name: "[help-libtasn1] 20160411 GNU Libtasn1 4.8 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e", }, { name: "DSA-3568", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3568", }, { name: "openSUSE-SU-2016:1674", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html", }, { name: "FEDORA-2016-96bfd9e873", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html", }, { name: "USN-2957-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2957-1", }, { name: "[oss-security] 20160411 Infinite loops parsing malicious DER certificates in libtasn1 4.7", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/04/11/3", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-04-11T00:00:00", descriptions: [ { lang: "en", value: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-201703-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201703-05", }, { name: "FEDORA-2016-048ffb6235", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625", }, { name: "USN-2957-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2957-2", }, { name: "FEDORA-2016-383b8250e6", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html", }, { name: "openSUSE-SU-2016:1567", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html", }, { name: "[help-libtasn1] 20160411 GNU Libtasn1 4.8 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e", }, { name: "DSA-3568", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3568", }, { name: "openSUSE-SU-2016:1674", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html", }, { name: "FEDORA-2016-96bfd9e873", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html", }, { name: "USN-2957-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2957-1", }, { name: "[oss-security] 20160411 Infinite loops parsing malicious DER certificates in libtasn1 4.7", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/04/11/3", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-4008", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201703-05", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201703-05", }, { name: "FEDORA-2016-048ffb6235", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html", }, { name: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625", refsource: "CONFIRM", url: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625", }, { name: "USN-2957-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2957-2", }, { name: "FEDORA-2016-383b8250e6", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html", }, { name: "openSUSE-SU-2016:1567", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html", }, { name: "[help-libtasn1] 20160411 GNU Libtasn1 4.8 released", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html", }, { name: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e", refsource: "CONFIRM", url: "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e", }, { name: "DSA-3568", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3568", }, { name: "openSUSE-SU-2016:1674", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html", }, { name: "FEDORA-2016-96bfd9e873", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html", }, { name: "USN-2957-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2957-1", }, { name: "[oss-security] 20160411 Infinite loops parsing malicious DER certificates in libtasn1 4.7", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/04/11/3", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-4008", datePublished: "2016-05-05T18:00:00", dateReserved: "2016-04-13T00:00:00", dateUpdated: "2024-08-06T00:17:30.800Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8618
Vulnerability from cvelistv5
Published
2018-07-31 21:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
References
â–Ľ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618 | x_refsource_CONFIRM | |
https://www.tenable.com/security/tns-2016-21 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037192 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM | |
https://curl.haxx.se/docs/adv_20161102D.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:2486 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201701-47 | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/94098 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:41.241Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102D.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94098", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94098", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102D.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94098", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94098", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8618", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", }, ], }, impact: { cvss: [ [ { vectorString: "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, ], [ { vectorString: "4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://curl.haxx.se/docs/adv_20161102D.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102D.html", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "94098", refsource: "BID", url: "http://www.securityfocus.com/bid/94098", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8618", datePublished: "2018-07-31T21:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:41.241Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8387
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.663Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8387", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.663Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-10685
Vulnerability from cvelistv5
Published
2017-06-29 23:00
Modified
2024-08-05 17:41
Severity ?
EPSS score ?
Summary
In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
References
â–Ľ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201804-13 | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.redhat.com/show_bug.cgi?id=1464692 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T17:41:55.479Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464692", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-06-29T00:00:00", descriptions: [ { lang: "en", value: "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-21T09:57:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464692", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-10685", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201804-13", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201804-13", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1464692", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464692", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-10685", datePublished: "2017-06-29T23:00:00", dateReserved: "2017-06-29T00:00:00", dateUpdated: "2024-08-05T17:41:55.479Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8393
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.659Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8393", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.659Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-9048
Vulnerability from cvelistv5
Published
2017-05-18 06:13
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.debian.org/security/2017/dsa-3952 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201711-01 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2017/05/15/1 | x_refsource_MISC | |
http://www.securityfocus.com/bid/98556 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:22.155Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "98556", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98556", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-18T00:00:00", descriptions: [ { lang: "en", value: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:07:10", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "98556", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98556", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9048", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3952", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201711-01", }, { name: "http://www.openwall.com/lists/oss-security/2017/05/15/1", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "98556", refsource: "BID", url: "http://www.securityfocus.com/bid/98556", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9048", datePublished: "2017-05-18T06:13:00", dateReserved: "2017-05-18T00:00:00", dateUpdated: "2024-08-05T16:55:22.155Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-5419
Vulnerability from cvelistv5
Published
2016-08-10 14:00
Modified
2024-08-06 01:01
Severity ?
EPSS score ?
Summary
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:01:00.484Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2016:2575", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { name: "92319", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92319", }, { name: "92292", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92292", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20160803A.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "1038341", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038341", }, { name: "SSA:2016-219-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "DSA-3638", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3638", }, { name: "1036538", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036538", }, { name: "openSUSE-SU-2016:2227", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "FEDORA-2016-24316f1f56", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "FEDORA-2016-8354baae0f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-03T00:00:00", descriptions: [ { lang: "en", value: "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2016:2575", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { name: "92319", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92319", }, { name: "92292", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92292", }, { tags: [ "x_refsource_MISC", ], url: "https://curl.haxx.se/docs/adv_20160803A.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "1038341", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038341", }, { name: "SSA:2016-219-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "DSA-3638", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3638", }, { name: "1036538", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036538", }, { name: "openSUSE-SU-2016:2227", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "FEDORA-2016-24316f1f56", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "FEDORA-2016-8354baae0f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-5419", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2016:2575", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { name: "92319", refsource: "BID", url: "http://www.securityfocus.com/bid/92319", }, { name: "92292", refsource: "BID", url: "http://www.securityfocus.com/bid/92292", }, { name: "https://curl.haxx.se/docs/adv_20160803A.html", refsource: "MISC", url: "https://curl.haxx.se/docs/adv_20160803A.html", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://source.android.com/security/bulletin/2016-12-01.html", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "1038341", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038341", }, { name: "SSA:2016-219-01", refsource: "SLACKWARE", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "DSA-3638", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3638", }, { name: "1036538", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036538", }, { name: "openSUSE-SU-2016:2227", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "FEDORA-2016-24316f1f56", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "FEDORA-2016-8354baae0f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-5419", datePublished: "2016-08-10T14:00:00", dateReserved: "2016-06-10T00:00:00", dateUpdated: "2024-08-06T01:01:00.484Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4448
Vulnerability from cvelistv5
Published
2016-06-09 16:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:24.779Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "SSA:2016-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160525 3 libxml2 issues", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/25/2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "90856", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90856", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9", }, { name: "APPLE-SA-2016-07-18-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html", }, { name: "APPLE-SA-2016-07-18-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html", }, { name: "APPLE-SA-2016-07-18-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206901", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1338700", }, { name: "APPLE-SA-2016-07-18-6", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206905", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206902", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206904", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206899", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-23T00:00:00", descriptions: [ { lang: "en", value: "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "SSA:2016-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160525 3 libxml2 issues", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/25/2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "90856", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90856", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9", }, { name: "APPLE-SA-2016-07-18-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html", }, { name: "APPLE-SA-2016-07-18-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html", }, { name: "APPLE-SA-2016-07-18-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206901", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1338700", }, { name: "APPLE-SA-2016-07-18-6", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206905", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206902", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206904", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206899", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-4448", datePublished: "2016-06-09T16:00:00", dateReserved: "2016-05-02T00:00:00", dateUpdated: "2024-08-06T00:32:24.779Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4483
Vulnerability from cvelistv5
Published
2017-04-11 16:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:25.437Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160503 CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/03/8", }, { name: "[oss-security] 20160504 Re: CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/04/7", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd", }, { name: "[oss-security] 20160607 Re: Please reject duplicate CVE for libxml2", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/07/5", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "90013", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90013", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3593", }, { name: "[oss-security] 20160607 Please reject duplicate CVE for libxml2", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/07/4", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036348", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:07:35", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160503 CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/03/8", }, { name: "[oss-security] 20160504 Re: CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/04/7", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd", }, { name: "[oss-security] 20160607 Re: Please reject duplicate CVE for libxml2", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/07/5", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "90013", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90013", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3593", }, { name: "[oss-security] 20160607 Please reject duplicate CVE for libxml2", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/07/4", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036348", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-4483", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160503 CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/05/03/8", }, { name: "[oss-security] 20160504 Re: CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/05/04/7", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd", }, { name: "[oss-security] 20160607 Re: Please reject duplicate CVE for libxml2", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/07/5", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "90013", refsource: "BID", url: "http://www.securityfocus.com/bid/90013", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "DSA-3593", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3593", }, { name: "[oss-security] 20160607 Please reject duplicate CVE for libxml2", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/07/4", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1036348", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036348", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-4483", datePublished: "2017-04-11T16:00:00", dateReserved: "2016-05-04T00:00:00", dateUpdated: "2024-08-06T00:32:25.437Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4447
Vulnerability from cvelistv5
Published
2016-06-09 16:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:25.110Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "SSA:2016-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722", }, { name: "90864", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90864", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160525 3 libxml2 issues", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/25/2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "APPLE-SA-2016-07-18-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html", }, { name: "APPLE-SA-2016-07-18-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html", }, { name: "APPLE-SA-2016-07-18-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206901", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "APPLE-SA-2016-07-18-6", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206905", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206902", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206904", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206899", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-23T00:00:00", descriptions: [ { lang: "en", value: "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "SSA:2016-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722", }, { name: "90864", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90864", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160525 3 libxml2 issues", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/25/2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "APPLE-SA-2016-07-18-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html", }, { name: "APPLE-SA-2016-07-18-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html", }, { name: "APPLE-SA-2016-07-18-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206901", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "APPLE-SA-2016-07-18-6", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206905", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206902", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206904", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206899", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-4447", datePublished: "2016-06-09T16:00:00", dateReserved: "2016-05-02T00:00:00", dateUpdated: "2024-08-06T00:32:25.110Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6263
Vulnerability from cvelistv5
Published
2016-09-07 20:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:22:20.763Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3658", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "GLSA-201908-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201908-06", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-20T00:00:00", descriptions: [ { lang: "en", value: "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:09:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3658", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "GLSA-201908-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201908-06", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-6263", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", refsource: "BID", url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3658", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { name: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555", refsource: "CONFIRM", url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555", }, { name: "USN-3068-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "GLSA-201908-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201908-06", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-6263", datePublished: "2016-09-07T20:00:00", dateReserved: "2016-07-21T00:00:00", dateUpdated: "2024-08-06T01:22:20.763Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-0718
Vulnerability from cvelistv5
Published
2016-05-26 16:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:30:03.995Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2016:2824", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2824.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "1037705", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037705", }, { name: "1036415", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036415", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "USN-2983-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2983-1", }, { name: "openSUSE-SU-2016:1523", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.eset.com/ca6333/", }, { name: "90729", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90729", }, { name: "USN-3044-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3044-1", }, { name: "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/17/12", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "SUSE-SU-2016:1508", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", }, { name: "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Feb/68", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "DSA-3582", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3582", }, { name: "SUSE-SU-2016:1512", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", }, { name: "openSUSE-SU-2016:1964", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206903", }, { name: "openSUSE-SU-2016:1441", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", }, { name: "openSUSE-SU-2016:2026", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-17T00:00:00", descriptions: [ { lang: "en", value: "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-31T07:06:39", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2016:2824", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2824.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "1037705", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037705", }, { name: "1036415", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036415", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "USN-2983-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2983-1", }, { name: "openSUSE-SU-2016:1523", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.eset.com/ca6333/", }, { name: "90729", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90729", }, { name: "USN-3044-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3044-1", }, { name: "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/17/12", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "SUSE-SU-2016:1508", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", }, { name: "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2017/Feb/68", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "DSA-3582", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3582", }, { name: "SUSE-SU-2016:1512", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", }, { name: "openSUSE-SU-2016:1964", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206903", }, { name: "openSUSE-SU-2016:1441", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", }, { name: "openSUSE-SU-2016:2026", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-0718", datePublished: "2016-05-26T16:00:00", dateReserved: "2015-12-16T00:00:00", dateUpdated: "2024-08-05T22:30:03.995Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8619
Vulnerability from cvelistv5
Published
2018-08-01 06:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
References
â–Ľ | URL | Tags |
---|---|---|
https://curl.haxx.se/docs/adv_20161102E.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619 | x_refsource_CONFIRM | |
https://curl.haxx.se/CVE-2016-8619.patch | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94100 | vdb-entry, x_refsource_BID | |
https://www.tenable.com/security/tns-2016-21 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037192 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:2486 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201701-47 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:40.965Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102E.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/CVE-2016-8619.patch", }, { name: "94100", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94100", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102E.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/CVE-2016-8619.patch", }, { name: "94100", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94100", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8619", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", }, ], }, impact: { cvss: [ [ { vectorString: "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, ], [ { vectorString: "4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "https://curl.haxx.se/docs/adv_20161102E.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102E.html", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619", }, { name: "https://curl.haxx.se/CVE-2016-8619.patch", refsource: "CONFIRM", url: "https://curl.haxx.se/CVE-2016-8619.patch", }, { name: "94100", refsource: "BID", url: "http://www.securityfocus.com/bid/94100", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8619", datePublished: "2018-08-01T06:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:40.965Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-5276
Vulnerability from cvelistv5
Published
2015-11-17 15:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
References
â–Ľ | URL | Tags |
---|---|---|
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1262846 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034375 | vdb-entry, x_refsource_SECTRACK | |
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T06:41:09.262Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1262846", }, { name: "openSUSE-SU-2015:1946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html", }, { name: "1034375", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034375", }, { name: "openSUSE-SU-2016:1069", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-10T00:00:00", descriptions: [ { lang: "en", value: "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T20:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1262846", }, { name: "openSUSE-SU-2015:1946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html", }, { name: "1034375", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034375", }, { name: "openSUSE-SU-2016:1069", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-5276", datePublished: "2015-11-17T15:00:00", dateReserved: "2015-07-01T00:00:00", dateUpdated: "2024-08-06T06:41:09.262Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8395
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.879Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8395", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8395", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.879Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-6278
Vulnerability from cvelistv5
Published
2014-09-30 10:00
Modified
2024-08-06 12:10
Severity ?
EPSS score ?
Summary
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:10:13.322Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61283", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2380-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security-tracker.debian.org/tracker/CVE-2014-6278", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61703", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61641", }, { name: "39887", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/39887/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60325", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1147414", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61485", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2014-6278.html", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "39568", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/39568/", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60055", }, { name: "59961", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59961", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-29T00:00:00", descriptions: [ { lang: "en", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-05T16:38:18", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61283", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2380-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security-tracker.debian.org/tracker/CVE-2014-6278", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61703", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61641", }, { name: "39887", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/39887/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60325", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1147414", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61485", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61312", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2014-6278.html", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "39568", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/39568/", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60055", }, { name: "59961", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59961", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2014-6278", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3093", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2380-1", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "https://security-tracker.debian.org/tracker/CVE-2014-6278", refsource: "CONFIRM", url: "https://security-tracker.debian.org/tracker/CVE-2014-6278", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "39887", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/39887/", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", refsource: "SECUNIA", url: "http://secunia.com/advisories/60325", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1147414", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1147414", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3094", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "http://support.novell.com/security/cve/CVE-2014-6278.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-6278.html", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "61780", refsource: "SECUNIA", url: "http://secunia.com/advisories/61780", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "39568", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/39568/", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", refsource: "SECUNIA", url: "http://secunia.com/advisories/61471", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "59961", refsource: "SECUNIA", url: "http://secunia.com/advisories/59961", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2014-6278", datePublished: "2014-09-30T10:00:00", dateReserved: "2014-09-09T00:00:00", dateUpdated: "2024-08-06T12:10:13.322Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-0191
Vulnerability from cvelistv5
Published
2015-01-21 02:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:05:39.238Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1090976", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT205030", }, { name: "67233", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/67233", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { name: "RHSA-2015:0749", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0749.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=9cd1c3cfbd32655d60572c0a413e017260c854df", }, { name: "libxml2-cve20140191-dos(93092)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/93092", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678183", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "APPLE-SA-2015-08-13-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html", }, { name: "openSUSE-SU-2015:2372", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT205031", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-05-06T00:00:00", descriptions: [ { lang: "en", value: "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1090976", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT205030", }, { name: "67233", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/67233", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { name: "RHSA-2015:0749", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0749.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=9cd1c3cfbd32655d60572c0a413e017260c854df", }, { name: "libxml2-cve20140191-dos(93092)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/93092", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678183", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "APPLE-SA-2015-08-13-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html", }, { name: "openSUSE-SU-2015:2372", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT205031", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-0191", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1090976", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1090976", }, { name: "https://support.apple.com/kb/HT205030", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT205030", }, { name: "67233", refsource: "BID", url: "http://www.securityfocus.com/bid/67233", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "RHSA-2015:0749", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0749.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=9cd1c3cfbd32655d60572c0a413e017260c854df", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=9cd1c3cfbd32655d60572c0a413e017260c854df", }, { name: "libxml2-cve20140191-dos(93092)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/93092", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678183", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678183", }, { name: "APPLE-SA-2015-08-13-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "APPLE-SA-2015-08-13-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html", }, { name: "openSUSE-SU-2015:2372", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html", }, { name: "https://support.apple.com/kb/HT205031", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT205031", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-0191", datePublished: "2015-01-21T02:00:00", dateReserved: "2013-12-03T00:00:00", dateUpdated: "2024-08-06T09:05:39.238Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-9233
Vulnerability from cvelistv5
Published
2017-07-25 20:00
Modified
2024-08-05 17:02
Severity ?
EPSS score ?
Summary
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T17:02:43.627Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://libexpat.github.io/doc/cve-2017-9233/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libexpat/libexpat/blob/master/expat/Changes", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039427", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208115", }, { name: "DSA-3898", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3898", }, { name: "99276", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/99276", }, { name: "[oss-security] 20170618 Expat 2.2.1 security fixes", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/06/17/7", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K03244804", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-06-17T00:00:00", descriptions: [ { lang: "en", value: "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:06:56", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://libexpat.github.io/doc/cve-2017-9233/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libexpat/libexpat/blob/master/expat/Changes", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039427", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208115", }, { name: "DSA-3898", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3898", }, { name: "99276", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/99276", }, { name: "[oss-security] 20170618 Expat 2.2.1 security fixes", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2017/06/17/7", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K03244804", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9233", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://support.apple.com/HT208144", refsource: "CONFIRM", url: "https://support.apple.com/HT208144", }, { name: "https://libexpat.github.io/doc/cve-2017-9233/", refsource: "CONFIRM", url: "https://libexpat.github.io/doc/cve-2017-9233/", }, { name: "https://github.com/libexpat/libexpat/blob/master/expat/Changes", refsource: "CONFIRM", url: "https://github.com/libexpat/libexpat/blob/master/expat/Changes", }, { name: "1039427", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039427", }, { name: "https://support.apple.com/HT208113", refsource: "CONFIRM", url: "https://support.apple.com/HT208113", }, { name: "https://support.apple.com/HT208112", refsource: "CONFIRM", url: "https://support.apple.com/HT208112", }, { name: "https://support.apple.com/HT208115", refsource: "CONFIRM", url: "https://support.apple.com/HT208115", }, { name: "DSA-3898", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3898", }, { name: "99276", refsource: "BID", url: "http://www.securityfocus.com/bid/99276", }, { name: "[oss-security] 20170618 Expat 2.2.1 security fixes", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2017/06/17/7", }, { name: "https://support.f5.com/csp/article/K03244804", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K03244804", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9233", datePublished: "2017-07-25T20:00:00", dateReserved: "2017-05-26T00:00:00", dateUpdated: "2024-08-05T17:02:43.627Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1762
Vulnerability from cvelistv5
Published
2016-03-24 01:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:38.984Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "APPLE-SA-2016-03-21-5", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206167", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206168", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "APPLE-SA-2016-03-21-6", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "1035353", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035353", }, { name: "APPLE-SA-2016-03-21-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=759671", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "APPLE-SA-2016-03-21-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206171", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "APPLE-SA-2016-03-21-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206169", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206166", }, { name: "85059", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/85059", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-03-21T00:00:00", descriptions: [ { lang: "en", value: "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "APPLE-SA-2016-03-21-5", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206167", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206168", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "APPLE-SA-2016-03-21-6", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "1035353", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035353", }, { name: "APPLE-SA-2016-03-21-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=759671", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "APPLE-SA-2016-03-21-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206171", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "APPLE-SA-2016-03-21-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206169", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206166", }, { name: "85059", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/85059", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1762", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "APPLE-SA-2016-03-21-5", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { name: "https://support.apple.com/HT206167", refsource: "CONFIRM", url: "https://support.apple.com/HT206167", }, { name: "https://support.apple.com/HT206168", refsource: "CONFIRM", url: "https://support.apple.com/HT206168", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "APPLE-SA-2016-03-21-6", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "1035353", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035353", }, { name: "APPLE-SA-2016-03-21-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=759671", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=759671", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "APPLE-SA-2016-03-21-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602", }, { name: "https://support.apple.com/HT206171", refsource: "CONFIRM", url: "https://support.apple.com/HT206171", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "APPLE-SA-2016-03-21-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html", }, { name: "https://support.apple.com/HT206169", refsource: "CONFIRM", url: "https://support.apple.com/HT206169", }, { name: "https://support.apple.com/HT206166", refsource: "CONFIRM", url: "https://support.apple.com/HT206166", }, { name: "85059", refsource: "BID", url: "http://www.securityfocus.com/bid/85059", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1762", datePublished: "2016-03-24T01:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:38.984Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9597
Vulnerability from cvelistv5
Published
2018-07-30 14:00
Modified
2024-08-06 02:59
Severity ?
EPSS score ?
Summary
It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98567 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9597 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:59:03.206Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "98567", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98567", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9597", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "libxml2", vendor: "Red Hat", versions: [ { status: "affected", version: "all", }, ], }, ], datePublic: "2016-12-22T00:00:00", descriptions: [ { lang: "en", value: "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-674", description: "CWE-674", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-31T09:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "98567", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98567", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9597", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-9597", datePublished: "2018-07-30T14:00:00", dateReserved: "2016-11-23T00:00:00", dateUpdated: "2024-08-06T02:59:03.206Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2107
Vulnerability from cvelistv5
Published
2016-05-05 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.633Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { name: "DSA-3566", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us", }, { name: "1035721", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1035721", }, { tags: [ "x_transferred", ], url: "http://support.citrix.com/article/CTX212736", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=68595c0c2886e7942a14f98c17a55a88afb6c292", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", }, { name: "openSUSE-SU-2016:1566", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { tags: [ "x_transferred", ], url: "https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { tags: [ "x_transferred", ], url: "http://source.android.com/security/bulletin/2016-07-01.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "89760", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/89760", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_transferred", ], url: "http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv/20160503.txt", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { name: "39768", tags: [ "exploit", "x_transferred", ], url: "https://www.exploit-db.com/exploits/39768/", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { name: "DSA-3566", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us", }, { name: "1035721", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1035721", }, { url: "http://support.citrix.com/article/CTX212736", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=68595c0c2886e7942a14f98c17a55a88afb6c292", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", }, { name: "openSUSE-SU-2016:1566", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { url: "https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/", }, { url: "https://www.tenable.com/security/tns-2016-18", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { url: "http://source.android.com/security/bulletin/2016-07-01.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "89760", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/89760", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { url: "http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { url: "https://www.openssl.org/news/secadv/20160503.txt", }, { url: "https://support.apple.com/HT206903", }, { url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { name: "39768", tags: [ "exploit", ], url: "https://www.exploit-db.com/exploits/39768/", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2107", datePublished: "2016-05-05T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.633Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-0634
Vulnerability from cvelistv5
Published
2017-08-28 15:00
Modified
2024-10-04 17:00
Severity ?
EPSS score ?
Summary
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.842Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160927 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/27/9", }, { name: "[oss-security] 20160916 CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/16/8", }, { name: "RHSA-2017:0725", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0725.html", }, { name: "[oss-security] 20160929 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/29/27", }, { name: "[oss-security] 20160920 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/20/1", }, { name: "92999", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92999", }, { name: "RHSA-2017:1931", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1931", }, { name: "[oss-security] 20161007 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/10/07/6", }, { name: "[oss-security] 20160918 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/18/11", }, { name: "[oss-security] 20160919 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/19/7", }, { name: "[oss-security] 20161010 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/10/10/4", }, { name: "[oss-security] 20160916 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/16/12", }, { name: "GLSA-201612-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-39", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1377613", }, { name: "[oss-security] 20161010 RE: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/10/10/3", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2016-0634", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-04T15:39:15.651571Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-04T17:00:57.944Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-16T00:00:00", descriptions: [ { lang: "en", value: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "[oss-security] 20160927 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/27/9", }, { name: "[oss-security] 20160916 CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/16/8", }, { name: "RHSA-2017:0725", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0725.html", }, { name: "[oss-security] 20160929 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/29/27", }, { name: "[oss-security] 20160920 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/20/1", }, { name: "92999", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92999", }, { name: "RHSA-2017:1931", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1931", }, { name: "[oss-security] 20161007 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/10/07/6", }, { name: "[oss-security] 20160918 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/18/11", }, { name: "[oss-security] 20160919 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/19/7", }, { name: "[oss-security] 20161010 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/10/10/4", }, { name: "[oss-security] 20160916 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/16/12", }, { name: "GLSA-201612-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201612-39", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1377613", }, { name: "[oss-security] 20161010 RE: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/10/10/3", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0634", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160927 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/27/9", }, { name: "[oss-security] 20160916 CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/16/8", }, { name: "RHSA-2017:0725", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2017-0725.html", }, { name: "[oss-security] 20160929 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/29/27", }, { name: "[oss-security] 20160920 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/20/1", }, { name: "92999", refsource: "BID", url: "http://www.securityfocus.com/bid/92999", }, { name: "RHSA-2017:1931", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1931", }, { name: "[oss-security] 20161007 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/10/07/6", }, { name: "[oss-security] 20160918 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/18/11", }, { name: "[oss-security] 20160919 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/19/7", }, { name: "[oss-security] 20161010 Re: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/10/10/4", }, { name: "[oss-security] 20160916 Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/16/12", }, { name: "GLSA-201612-39", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201612-39", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1377613", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1377613", }, { name: "[oss-security] 20161010 RE: Re: CVE-2016-0634 -- bash prompt expanding $HOSTNAME", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/10/10/3", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0634", datePublished: "2017-08-28T15:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-10-04T17:00:57.944Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2073
Vulnerability from cvelistv5
Published
2016-02-12 15:26
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1035011 | vdb-entry, x_refsource_SECTRACK | |
https://www.debian.org/security/2016/dsa-3593 | vendor-advisory, x_refsource_DEBIAN | |
http://www.ubuntu.com/usn/USN-2994-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2016/01/26/7 | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/201701-37 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2016/01/25/6 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/85267 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.386Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1035011", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035011", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "[oss-security] 20160126 Re: Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/01/26/7", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "[oss-security] 20160125 Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/01/25/6", }, { name: "85267", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/85267", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-25T00:00:00", descriptions: [ { lang: "en", value: "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1035011", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035011", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "[oss-security] 20160126 Re: Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/01/26/7", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "[oss-security] 20160125 Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/01/25/6", }, { name: "85267", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/85267", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-2073", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1035011", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035011", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "[oss-security] 20160126 Re: Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/01/26/7", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "[oss-security] 20160125 Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/01/25/6", }, { name: "85267", refsource: "BID", url: "http://www.securityfocus.com/bid/85267", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-2073", datePublished: "2016-02-12T15:26:00", dateReserved: "2016-01-26T00:00:00", dateUpdated: "2024-08-05T23:17:50.386Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-5420
Vulnerability from cvelistv5
Published
2016-08-10 14:00
Modified
2024-08-06 01:01
Severity ?
EPSS score ?
Summary
curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:01:00.390Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2016:2575", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "92309", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92309", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "SSA:2016-219-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "1036739", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036739", }, { name: "DSA-3638", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3638", }, { name: "openSUSE-SU-2016:2227", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "1036537", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036537", }, { name: "FEDORA-2016-24316f1f56", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20160803B.html", }, { name: "FEDORA-2016-8354baae0f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-03T00:00:00", descriptions: [ { lang: "en", value: "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2016:2575", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "92309", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92309", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "SSA:2016-219-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "1036739", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036739", }, { name: "DSA-3638", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3638", }, { name: "openSUSE-SU-2016:2227", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "1036537", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036537", }, { name: "FEDORA-2016-24316f1f56", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", ], url: "https://curl.haxx.se/docs/adv_20160803B.html", }, { name: "FEDORA-2016-8354baae0f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-5420", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2016:2575", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2575.html", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "92309", refsource: "BID", url: "http://www.securityfocus.com/bid/92309", }, { name: "https://source.android.com/security/bulletin/2016-12-01.html", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "SSA:2016-219-01", refsource: "SLACKWARE", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "1036739", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036739", }, { name: "DSA-3638", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3638", }, { name: "openSUSE-SU-2016:2227", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "1036537", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036537", }, { name: "FEDORA-2016-24316f1f56", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://curl.haxx.se/docs/adv_20160803B.html", refsource: "MISC", url: "https://curl.haxx.se/docs/adv_20160803B.html", }, { name: "FEDORA-2016-8354baae0f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-5420", datePublished: "2016-08-10T14:00:00", dateReserved: "2016-06-10T00:00:00", dateUpdated: "2024-08-06T01:01:00.390Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8948
Vulnerability from cvelistv5
Published
2016-09-07 20:00
Modified
2024-08-06 08:36
Severity ?
EPSS score ?
Summary
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:36:30.742Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3658", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-20T00:00:00", descriptions: [ { lang: "en", value: "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:08:10", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3658", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8948", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", refsource: "BID", url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3658", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { name: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041", refsource: "CONFIRM", url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041", }, { name: "USN-3068-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8948", datePublished: "2016-09-07T20:00:00", dateReserved: "2016-07-21T00:00:00", dateUpdated: "2024-08-06T08:36:30.742Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-7169
Vulnerability from cvelistv5
Published
2014-09-25 01:00
Modified
2025-02-10 19:31
Severity ?
EPSS score ?
Summary
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:40:19.217Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "[oss-security] 20140924 Re: CVE-2014-6271: remote code execution through bash", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2014/09/24/32", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "HPSBHF03119", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141216668515282&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "61676", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61676", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "RHSA-2014:1306", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1306.html", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "61715", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61715", }, { name: "USN-2363-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2363-2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61283", }, { name: "SSRT101711", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61654", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62312", }, { name: "59272", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59272", }, { name: "HPSBST03122", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141319209015420&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "USN-2363-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2363-1", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61703", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6495", }, { name: "VU#252743", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/252743", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61065", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3075.html", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2014-7169.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "TA14-268A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-268A", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/node/1200223", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "APPLE-SA-2014-10-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "61619", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61619", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3078.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60325", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "34879", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/34879/", }, { name: "61622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61622", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/articles/1200223", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62343", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0393.html", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61873", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61618", }, { name: "60947", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60947", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6535", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61479", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60034", }, { name: "HPSBMU03133", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330425327438&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://twitter.com/taviso/statuses/514887394294652929", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBGN03117", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141216207813411&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200223", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3077.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "62228", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62228", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61855", }, { name: "HPSBHF03124", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141235957116749&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "59737", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59737", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61711", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61711", }, { name: "HPSBOV03228", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61128", }, { name: "DSA-3035", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3035", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60055", }, { name: "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1306.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61129", }, { name: "61700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61700", }, { name: "61626", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61626", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2014-7169", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-10T19:31:47.209255Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-01-28", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2014-7169", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-10T19:31:56.166Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-24T00:00:00.000Z", descriptions: [ { lang: "en", value: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-05T16:41:42.000Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "[oss-security] 20140924 Re: CVE-2014-6271: remote code execution through bash", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2014/09/24/32", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "HPSBHF03119", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141216668515282&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "61676", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61676", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "RHSA-2014:1306", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1306.html", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "61715", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61715", }, { name: "USN-2363-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2363-2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61283", }, { name: "SSRT101711", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61654", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62312", }, { name: "59272", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59272", }, { name: "HPSBST03122", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141319209015420&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "USN-2363-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2363-1", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61703", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6495", }, { name: "VU#252743", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/252743", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61065", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3075.html", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2014-7169.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "TA14-268A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-268A", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/node/1200223", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "APPLE-SA-2014-10-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "61619", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61619", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3078.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60325", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "34879", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/34879/", }, { name: "61622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61622", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/articles/1200223", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62343", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0393.html", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61873", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61618", }, { name: "60947", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60947", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6535", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61479", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60034", }, { name: "HPSBMU03133", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330425327438&w=2", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_MISC", ], url: "http://twitter.com/taviso/statuses/514887394294652929", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBGN03117", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141216207813411&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200223", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3077.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "62228", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62228", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61855", }, { name: "HPSBHF03124", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141235957116749&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "59737", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59737", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61711", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61711", }, { name: "HPSBOV03228", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61128", }, { name: "DSA-3035", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3035", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60055", }, { name: "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1306.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61129", }, { name: "61700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61700", }, { name: "61626", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61626", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-7169", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "[oss-security] 20140924 Re: CVE-2014-6271: remote code execution through bash", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2014/09/24/32", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "HPSBHF03119", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141216668515282&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", refsource: "SECUNIA", url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "61676", refsource: "SECUNIA", url: "http://secunia.com/advisories/61676", }, { name: "openSUSE-SU-2014:1254", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "RHSA-2014:1306", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1306.html", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "61715", refsource: "SECUNIA", url: "http://secunia.com/advisories/61715", }, { name: "USN-2363-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2363-2", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "HPSBST03195", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "SSRT101711", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015701", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "59272", refsource: "SECUNIA", url: "http://secunia.com/advisories/59272", }, { name: "HPSBST03122", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141319209015420&w=2", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "USN-2363-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2363-1", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "http://support.apple.com/kb/HT6495", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6495", }, { name: "VU#252743", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/252743", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3075.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3075.html", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://support.novell.com/security/cve/CVE-2014-7169.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-7169.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "TA14-268A", refsource: "CERT", url: "http://www.us-cert.gov/ncas/alerts/TA14-268A", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "https://access.redhat.com/node/1200223", refsource: "CONFIRM", url: "https://access.redhat.com/node/1200223", }, { name: "SUSE-SU-2014:1287", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "APPLE-SA-2014-10-16-1", refsource: "APPLE", url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "61619", refsource: "SECUNIA", url: "http://secunia.com/advisories/61619", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3078.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3078.html", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", refsource: "SECUNIA", url: "http://secunia.com/advisories/60325", }, { name: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", refsource: "CONFIRM", url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "34879", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/34879/", }, { name: "61622", refsource: "SECUNIA", url: "http://secunia.com/advisories/61622", }, { name: "https://access.redhat.com/articles/1200223", refsource: "CONFIRM", url: "https://access.redhat.com/articles/1200223", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "http://advisories.mageia.org/MGASA-2014-0393.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0393.html", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", refsource: "SECUNIA", url: "http://secunia.com/advisories/61873", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", refsource: "SECUNIA", url: "http://secunia.com/advisories/61618", }, { name: "60947", refsource: "SECUNIA", url: "http://secunia.com/advisories/60947", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "https://support.apple.com/kb/HT6535", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT6535", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", refsource: "SECUNIA", url: "http://secunia.com/advisories/61479", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "HPSBMU03133", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330425327438&w=2", }, { name: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://twitter.com/taviso/statuses/514887394294652929", refsource: "MISC", url: "http://twitter.com/taviso/statuses/514887394294652929", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBGN03117", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141216207813411&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "61780", refsource: "SECUNIA", url: "http://secunia.com/advisories/61780", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3077.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3077.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "62228", refsource: "SECUNIA", url: "http://secunia.com/advisories/62228", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", refsource: "SECUNIA", url: "http://secunia.com/advisories/61855", }, { name: "HPSBHF03124", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141235957116749&w=2", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "59737", refsource: "SECUNIA", url: "http://secunia.com/advisories/59737", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61711", refsource: "SECUNIA", url: "http://secunia.com/advisories/61711", }, { name: "HPSBOV03228", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "DSA-3035", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-3035", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", refsource: "SECUNIA", url: "http://secunia.com/advisories/61471", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1306.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1306.html", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61700", refsource: "SECUNIA", url: "http://secunia.com/advisories/61700", }, { name: "61626", refsource: "SECUNIA", url: "http://secunia.com/advisories/61626", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-7169", datePublished: "2014-09-25T01:00:00.000Z", dateReserved: "2014-09-24T00:00:00.000Z", dateUpdated: "2025-02-10T19:31:56.166Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2182
Vulnerability from cvelistv5
Published
2016-09-16 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.604Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1036688", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036688", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2018:2185", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2185", }, { name: "RHSA-2018:2186", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2186", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "92557", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/92557", }, { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/2017-03-01", }, { name: "1037968", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1037968", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10171", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=07bed46f332fce8c1d157689a2cdf915a982ae34", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/2017-03-01.html", }, { name: "RHSA-2018:2187", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2187", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/csp/article/K01276005", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { name: "DSA-3673", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-15T00:00:00", descriptions: [ { lang: "en", value: "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "1036688", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036688", }, { url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2018:2185", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2185", }, { name: "RHSA-2018:2186", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2186", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "92557", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/92557", }, { url: "https://source.android.com/security/bulletin/2017-03-01", }, { name: "1037968", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1037968", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10171", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=07bed46f332fce8c1d157689a2cdf915a982ae34", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { url: "https://source.android.com/security/bulletin/2017-03-01.html", }, { name: "RHSA-2018:2187", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2187", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { url: "https://support.f5.com/csp/article/K01276005", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { name: "DSA-3673", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2182", datePublished: "2016-09-16T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.604Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6262
Vulnerability from cvelistv5
Published
2016-09-07 20:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:22:20.764Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-20T00:00:00", descriptions: [ { lang: "en", value: "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:06:28", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-6262", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "openSUSE-SU-2016:1924", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html", }, { name: "92070", refsource: "BID", url: "http://www.securityfocus.com/bid/92070", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { name: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60", refsource: "CONFIRM", url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60", }, { name: "USN-3068-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-6262", datePublished: "2016-09-07T20:00:00", dateReserved: "2016-07-21T00:00:00", dateUpdated: "2024-08-06T01:22:20.764Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-11112
Vulnerability from cvelistv5
Published
2017-07-08 17:00
Modified
2024-08-05 17:57
Severity ?
EPSS score ?
Summary
In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
References
â–Ľ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201804-13 | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.redhat.com/show_bug.cgi?id=1464686 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T17:57:57.879Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464686", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-07-08T00:00:00", descriptions: [ { lang: "en", value: "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-21T09:57:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464686", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-11112", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201804-13", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201804-13", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1464686", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464686", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-11112", datePublished: "2017-07-08T17:00:00", dateReserved: "2017-07-08T00:00:00", dateUpdated: "2024-08-05T17:57:57.879Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2105
Vulnerability from cvelistv5
Published
2016-05-05 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.709Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { name: "89757", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/89757", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3566", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1035721", }, { name: "RHSA-2016:1648", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1648.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=5b814481f3573fa9677f3a31ee51322e2a22ee6a", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { name: "openSUSE-SU-2016:1566", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2017-11-01", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:1649", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1649.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv/20160503.txt", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { name: "89757", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/89757", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3566", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1035721", }, { name: "RHSA-2016:1648", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1648.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=5b814481f3573fa9677f3a31ee51322e2a22ee6a", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { name: "openSUSE-SU-2016:1566", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { url: "https://source.android.com/security/bulletin/pixel/2017-11-01", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:1649", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1649.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { url: "https://www.openssl.org/news/secadv/20160503.txt", }, { url: "https://support.apple.com/HT206903", }, { url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2105", datePublished: "2016-05-05T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.709Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2178
Vulnerability from cvelistv5
Published
2016-06-20 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.594Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2017:1659", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1659.html", }, { name: "[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/09/8", }, { name: "RHSA-2017:1658", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1658", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=399944622df7bd81af62e67ea967c470534090e2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "91081", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91081", }, { name: "RHSA-2017:0194", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:0194", }, { name: "[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/2", }, { name: "RHSA-2017:0193", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:0193", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1343400", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { name: "1036054", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036054", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "http://eprint.iacr.org/2016/594.pdf", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/8", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/4", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/6", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/csp/article/K53084033", }, { name: "USN-3087-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/10", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/11", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/5", }, { name: "DSA-3673", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/12", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/7", }, { name: "[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/09/2", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-06-06T00:00:00", descriptions: [ { lang: "en", value: "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2017:1659", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1659.html", }, { name: "[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/09/8", }, { name: "RHSA-2017:1658", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1658", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=399944622df7bd81af62e67ea967c470534090e2", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "91081", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91081", }, { name: "RHSA-2017:0194", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:0194", }, { name: "[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/2", }, { name: "RHSA-2017:0193", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:0193", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1343400", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { name: "1036054", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036054", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "http://eprint.iacr.org/2016/594.pdf", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/8", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/4", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/6", }, { url: "https://support.f5.com/csp/article/K53084033", }, { name: "USN-3087-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/10", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/11", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/5", }, { name: "DSA-3673", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/12", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/7", }, { name: "[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/09/2", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2178", datePublished: "2016-06-20T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.594Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-11113
Vulnerability from cvelistv5
Published
2017-07-08 17:00
Modified
2024-08-05 17:57
Severity ?
EPSS score ?
Summary
In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
References
â–Ľ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201804-13 | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.redhat.com/show_bug.cgi?id=1464691 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T17:57:57.943Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464691", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-07-08T00:00:00", descriptions: [ { lang: "en", value: "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-21T09:57:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464691", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-11113", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201804-13", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201804-13", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1464691", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464691", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-11113", datePublished: "2017-07-08T17:00:00", dateReserved: "2017-07-08T00:00:00", dateUpdated: "2024-08-05T17:57:57.943Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1238
Vulnerability from cvelistv5
Published
2016-08-02 14:00
Modified
2024-08-05 22:48
Severity ?
EPSS score ?
Summary
(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:48:13.656Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "GLSA-201812-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201812-07", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab", }, { name: "1036440", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036440", }, { name: "DSA-3628", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3628", }, { name: "[announce] 20180916 [SECURITY] Apache SpamAssassin 3.4.2 resolves CVE-2017-15705, CVE-2016-1238, CVE-2018-11780 & CVE-2018-11781", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E", }, { name: "FEDORA-2016-6ec2009080", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/", }, { name: "[perl.perl5.porters] 20160725 CVE-2016-1238: Important unsafe module load path flaw", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html", }, { name: "FEDORA-2016-e9e5c081d4", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { name: "FEDORA-2016-dd20a4631a", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/", }, { name: "92136", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92136", }, { name: "[debian-lts-announce] 20181113 [SECURITY] [DLA 1578-1] spamassassin security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://rt.perl.org/Public/Bug/Display.html?id=127834", }, { name: "openSUSE-SU-2019:1831", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-25T00:00:00", descriptions: [ { lang: "en", value: "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-06T20:06:06", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "GLSA-201812-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201812-07", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab", }, { name: "1036440", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036440", }, { name: "DSA-3628", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3628", }, { name: "[announce] 20180916 [SECURITY] Apache SpamAssassin 3.4.2 resolves CVE-2017-15705, CVE-2016-1238, CVE-2018-11780 & CVE-2018-11781", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E", }, { name: "FEDORA-2016-6ec2009080", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/", }, { name: "[perl.perl5.porters] 20160725 CVE-2016-1238: Important unsafe module load path flaw", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html", }, { name: "FEDORA-2016-e9e5c081d4", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { name: "FEDORA-2016-dd20a4631a", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/", }, { name: "92136", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92136", }, { name: "[debian-lts-announce] 20181113 [SECURITY] [DLA 1578-1] spamassassin security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://rt.perl.org/Public/Bug/Display.html?id=127834", }, { name: "openSUSE-SU-2019:1831", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2016-1238", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201701-75", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-75", }, { name: "GLSA-201812-07", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201812-07", }, { name: "http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab", refsource: "CONFIRM", url: "http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab", }, { name: "1036440", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036440", }, { name: "DSA-3628", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3628", }, { name: "[announce] 20180916 [SECURITY] Apache SpamAssassin 3.4.2 resolves CVE-2017-15705, CVE-2016-1238, CVE-2018-11780 & CVE-2018-11781", refsource: "MLIST", url: "https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E", }, { name: "FEDORA-2016-6ec2009080", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/", }, { name: "[perl.perl5.porters] 20160725 CVE-2016-1238: Important unsafe module load path flaw", refsource: "MLIST", url: "http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html", }, { name: "FEDORA-2016-e9e5c081d4", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { name: "FEDORA-2016-dd20a4631a", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/", }, { name: "92136", refsource: "BID", url: "http://www.securityfocus.com/bid/92136", }, { name: "[debian-lts-announce] 20181113 [SECURITY] [DLA 1578-1] spamassassin security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html", }, { name: "https://rt.perl.org/Public/Bug/Display.html?id=127834", refsource: "CONFIRM", url: "https://rt.perl.org/Public/Bug/Display.html?id=127834", }, { name: "openSUSE-SU-2019:1831", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2016-1238", datePublished: "2016-08-02T14:00:00", dateReserved: "2015-12-27T00:00:00", dateUpdated: "2024-08-05T22:48:13.656Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8622
Vulnerability from cvelistv5
Published
2018-07-31 21:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
References
â–Ľ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://curl.haxx.se/docs/adv_20161102H.html | x_refsource_CONFIRM | |
https://www.tenable.com/security/tns-2016-21 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037192 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94105 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:2486 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201701-47 | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:40.993Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102H.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "94105", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94105", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-122", description: "CWE-122", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102H.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "94105", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94105", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8622", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", }, ], }, impact: { cvss: [ [ { vectorString: "3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, ], [ { vectorString: "2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-190", }, ], }, { description: [ { lang: "eng", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://curl.haxx.se/docs/adv_20161102H.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102H.html", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "94105", refsource: "BID", url: "http://www.securityfocus.com/bid/94105", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8622", datePublished: "2018-07-31T21:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:40.993Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-9049
Vulnerability from cvelistv5
Published
2017-05-18 06:13
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.debian.org/security/2017/dsa-3952 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201711-01 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2017/05/15/1 | x_refsource_MISC | |
http://www.securityfocus.com/bid/98601 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:22.042Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "98601", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98601", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-18T00:00:00", descriptions: [ { lang: "en", value: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:09:57", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "98601", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98601", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9049", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3952", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201711-01", }, { name: "http://www.openwall.com/lists/oss-security/2017/05/15/1", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "98601", refsource: "BID", url: "http://www.securityfocus.com/bid/98601", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9049", datePublished: "2017-05-18T06:13:00", dateReserved: "2017-05-18T00:00:00", dateUpdated: "2024-08-05T16:55:22.042Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-5300
Vulnerability from cvelistv5
Published
2016-06-16 18:00
Modified
2024-08-06 01:00
Severity ?
EPSS score ?
Summary
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:00:57.567Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "[oss-security] 20160604 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/04/4", }, { name: "DSA-3597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3597", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "91159", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91159", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "USN-3010-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3010-1", }, { name: "[oss-security] 20160604 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/04/5", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-06-04T00:00:00", descriptions: [ { lang: "en", value: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-31T07:06:13", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "[oss-security] 20160604 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/04/4", }, { name: "DSA-3597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3597", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "91159", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91159", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "USN-3010-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3010-1", }, { name: "[oss-security] 20160604 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/04/5", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-5300", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.tenable.com/security/tns-2016-20", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-20", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "[oss-security] 20160604 Re: expat hash collision fix too predictable?", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/04/4", }, { name: "DSA-3597", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3597", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "91159", refsource: "BID", url: "http://www.securityfocus.com/bid/91159", }, { name: "GLSA-201701-21", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-21", }, { name: "https://source.android.com/security/bulletin/2016-11-01.html", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "USN-3010-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3010-1", }, { name: "[oss-security] 20160604 Re: expat hash collision fix too predictable?", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/04/5", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-5300", datePublished: "2016-06-16T18:00:00", dateReserved: "2016-06-04T00:00:00", dateUpdated: "2024-08-06T01:00:57.567Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1838
Vulnerability from cvelistv5
Published
2016-05-20 10:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:40.042Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=758588", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=639", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-16T00:00:00", descriptions: [ { lang: "en", value: "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=758588", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=639", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1838", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "https://support.apple.com/HT206567", refsource: "CONFIRM", url: "https://support.apple.com/HT206567", }, { name: "90691", refsource: "BID", url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=758588", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=758588", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9", }, { name: "APPLE-SA-2016-05-16-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=639", refsource: "MISC", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=639", }, { name: "https://support.apple.com/HT206566", refsource: "CONFIRM", url: "https://support.apple.com/HT206566", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { name: "https://support.apple.com/HT206564", refsource: "CONFIRM", url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "https://support.apple.com/HT206568", refsource: "CONFIRM", url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1838", datePublished: "2016-05-20T10:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:40.042Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-6271
Vulnerability from cvelistv5
Published
2014-09-24 18:00
Modified
2025-02-07 13:47
Severity ?
EPSS score ?
Summary
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:10:13.276Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "37816", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/37816/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "SUSE-SU-2014:1223", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "SSRT101816", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142719845423222&w=2", }, { name: "39918", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/39918/", }, { name: "HPSBHF03119", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141216668515282&w=2", }, { name: "RHSA-2014:1295", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1295.html", }, { name: "openSUSE-SU-2014:1226", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "HPSBST03196", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142719845423222&w=2", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61188", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "61676", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61676", }, { name: "40619", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/40619/", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60433", }, { name: "38849", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/38849/", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", }, { name: "SUSE-SU-2014:1260", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "61715", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61715", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61283", }, { name: "SSRT101711", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { name: "USN-2362-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2362-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61654", }, { name: "61542", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61542", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62312", }, { name: "59272", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59272", }, { name: "HPSBST03122", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141319209015420&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61703", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6495", }, { name: "VU#252743", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/252743", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61065", }, { name: "SUSE-SU-2014:1213", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "70103", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/70103", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "TA14-268A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-268A", }, { name: "SUSE-SU-2014:1212", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61641", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/node/1200223", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "APPLE-SA-2014-10-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "RHSA-2014:1293", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1293.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "openSUSE-SU-2014:1238", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60325", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "34879", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/34879/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/articles/1200223", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61873", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61485", }, { name: "60947", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60947", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6535", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1294.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60063", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60034", }, { name: "HPSBMU03133", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330425327438&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "40938", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/40938/", }, { name: "HPSBGN03117", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141216207813411&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2014-6271.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "61547", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61547", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "DSA-3032", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3032", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "62228", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62228", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61855", }, { name: "HPSBHF03124", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141235957116749&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61291", }, { name: "RHSA-2014:1294", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1294.html", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "59737", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59737", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61711", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61711", }, { name: "HPSBOV03228", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0388.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60055", }, { name: "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1293.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "42938", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/42938/", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61129", }, { name: "61700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61700", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2014-6271", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-07T13:45:49.549420Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-01-28", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2014-6271", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-07T13:47:31.669Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-24T00:00:00.000Z", descriptions: [ { lang: "en", value: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-05T16:37:05.000Z", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "37816", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/37816/", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "SUSE-SU-2014:1223", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "SSRT101816", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142719845423222&w=2", }, { name: "39918", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/39918/", }, { name: "HPSBHF03119", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141216668515282&w=2", }, { name: "RHSA-2014:1295", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1295.html", }, { name: "openSUSE-SU-2014:1226", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "HPSBST03196", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142719845423222&w=2", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61188", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "61676", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61676", }, { name: "40619", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/40619/", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60433", }, { name: "38849", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/38849/", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", }, { name: "SUSE-SU-2014:1260", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "61715", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61715", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61283", }, { name: "SSRT101711", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { name: "USN-2362-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2362-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61654", }, { name: "61542", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61542", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62312", }, { name: "59272", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59272", }, { name: "HPSBST03122", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141319209015420&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61703", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6495", }, { name: "VU#252743", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/252743", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61065", }, { name: "SUSE-SU-2014:1213", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "70103", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/70103", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "TA14-268A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-268A", }, { name: "SUSE-SU-2014:1212", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61641", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/node/1200223", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "APPLE-SA-2014-10-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "RHSA-2014:1293", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1293.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "openSUSE-SU-2014:1238", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60325", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "34879", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/34879/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/articles/1200223", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61873", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61485", }, { name: "60947", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60947", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6535", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1294.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60063", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60034", }, { name: "HPSBMU03133", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330425327438&w=2", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "40938", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/40938/", }, { name: "HPSBGN03117", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141216207813411&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2014-6271.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "61547", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61547", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "DSA-3032", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3032", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "62228", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62228", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61855", }, { name: "HPSBHF03124", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141235957116749&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61291", }, { name: "RHSA-2014:1294", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1294.html", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "59737", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59737", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61711", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61711", }, { name: "HPSBOV03228", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0388.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60055", }, { name: "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1293.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "42938", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/42938/", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61129", }, { name: "61700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61700", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2014-6271", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "37816", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/37816/", }, { name: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "SUSE-SU-2014:1223", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "SSRT101816", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142719845423222&w=2", }, { name: "39918", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/39918/", }, { name: "HPSBHF03119", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141216668515282&w=2", }, { name: "RHSA-2014:1295", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1295.html", }, { name: "openSUSE-SU-2014:1226", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", }, { name: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", refsource: "CONFIRM", url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "HPSBST03196", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142719845423222&w=2", }, { name: "61188", refsource: "SECUNIA", url: "http://secunia.com/advisories/61188", }, { name: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", refsource: "CONFIRM", url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "61676", refsource: "SECUNIA", url: "http://secunia.com/advisories/61676", }, { name: "40619", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/40619/", }, { name: "openSUSE-SU-2014:1254", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "38849", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/38849/", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", }, { name: "SUSE-SU-2014:1260", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "61715", refsource: "SECUNIA", url: "http://secunia.com/advisories/61715", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "HPSBST03195", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "SSRT101711", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { name: "USN-2362-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2362-1", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "61542", refsource: "SECUNIA", url: "http://secunia.com/advisories/61542", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015701", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "59272", refsource: "SECUNIA", url: "http://secunia.com/advisories/59272", }, { name: "HPSBST03122", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141319209015420&w=2", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "http://support.apple.com/kb/HT6495", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6495", }, { name: "VU#252743", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/252743", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "SUSE-SU-2014:1213", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "70103", refsource: "BID", url: "http://www.securityfocus.com/bid/70103", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "TA14-268A", refsource: "CERT", url: "http://www.us-cert.gov/ncas/alerts/TA14-268A", }, { name: "SUSE-SU-2014:1212", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "https://access.redhat.com/node/1200223", refsource: "CONFIRM", url: "https://access.redhat.com/node/1200223", }, { name: "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", }, { name: "SUSE-SU-2014:1287", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "APPLE-SA-2014-10-16-1", refsource: "APPLE", url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "RHSA-2014:1293", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1293.html", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "openSUSE-SU-2014:1238", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", refsource: "SECUNIA", url: "http://secunia.com/advisories/60325", }, { name: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", refsource: "CONFIRM", url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "34879", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/34879/", }, { name: "https://access.redhat.com/articles/1200223", refsource: "CONFIRM", url: "https://access.redhat.com/articles/1200223", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", refsource: "SECUNIA", url: "http://secunia.com/advisories/61873", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "60947", refsource: "SECUNIA", url: "http://secunia.com/advisories/60947", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "https://support.apple.com/kb/HT6535", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT6535", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "HPSBST03265", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1294.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1294.html", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "HPSBMU03133", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330425327438&w=2", }, { name: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "40938", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/40938/", }, { name: "HPSBGN03117", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141216207813411&w=2", }, { name: "http://support.novell.com/security/cve/CVE-2014-6271.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-6271.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "61547", refsource: "SECUNIA", url: "http://secunia.com/advisories/61547", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "61780", refsource: "SECUNIA", url: "http://secunia.com/advisories/61780", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "DSA-3032", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-3032", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "62228", refsource: "SECUNIA", url: "http://secunia.com/advisories/62228", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", refsource: "SECUNIA", url: "http://secunia.com/advisories/61855", }, { name: "HPSBHF03124", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141235957116749&w=2", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "RHSA-2014:1294", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1294.html", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "59737", refsource: "SECUNIA", url: "http://secunia.com/advisories/59737", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61711", refsource: "SECUNIA", url: "http://secunia.com/advisories/61711", }, { name: "HPSBOV03228", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142113462216480&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "http://advisories.mageia.org/MGASA-2014-0388.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0388.html", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", refsource: "SECUNIA", url: "http://secunia.com/advisories/61471", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "20140926 GNU Bash Environmental Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1293.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1293.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "42938", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/42938/", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61700", refsource: "SECUNIA", url: "http://secunia.com/advisories/61700", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { name: "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2014-6271", datePublished: "2014-09-24T18:00:00.000Z", dateReserved: "2014-09-09T00:00:00.000Z", dateUpdated: "2025-02-07T13:47:31.669Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8389
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.555Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8389", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.555Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-3075
Vulnerability from cvelistv5
Published
2016-06-01 20:00
Modified
2024-08-05 23:40
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
References
â–Ľ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/85732 | vdb-entry, x_refsource_BID | |
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4 | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201702-11 | vendor-advisory, x_refsource_GENTOO | |
http://rhn.redhat.com/errata/RHSA-2016-2573.html | vendor-advisory, x_refsource_REDHAT | |
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html | vendor-advisory, x_refsource_SUSE | |
http://www.ubuntu.com/usn/USN-2985-1 | vendor-advisory, x_refsource_UBUNTU | |
https://sourceware.org/bugzilla/show_bug.cgi?id=19879 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:40:15.642Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2016-68abc0be35", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", }, { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "85732", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/85732", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4", }, { name: "GLSA-201702-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201702-11", }, { name: "RHSA-2016:2573", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2573.html", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "USN-2985-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2985-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=19879", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-03-29T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "FEDORA-2016-68abc0be35", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", }, { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "85732", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/85732", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4", }, { name: "GLSA-201702-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201702-11", }, { name: "RHSA-2016:2573", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2573.html", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "USN-2985-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2985-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=19879", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-3075", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2016-68abc0be35", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", }, { name: "openSUSE-SU-2016:1779", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "85732", refsource: "BID", url: "http://www.securityfocus.com/bid/85732", }, { name: "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4", refsource: "CONFIRM", url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4", }, { name: "GLSA-201702-11", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201702-11", }, { name: "RHSA-2016:2573", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2573.html", }, { name: "openSUSE-SU-2016:1527", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "USN-2985-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2985-1", }, { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=19879", refsource: "CONFIRM", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=19879", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-3075", datePublished: "2016-06-01T20:00:00", dateReserved: "2016-03-10T00:00:00", dateUpdated: "2024-08-05T23:40:15.642Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-3217
Vulnerability from cvelistv5
Published
2016-12-13 16:00
Modified
2024-08-06 05:39
Severity ?
EPSS score ?
Summary
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
References
â–Ľ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://vcs.pcre.org/pcre?view=revision&revision=1566 | x_refsource_CONFIRM | |
https://bugs.exim.org/show_bug.cgi?id=1638 | x_refsource_CONFIRM | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/06/03/7 | mailing-list, x_refsource_MLIST | |
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-1025.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=1228283 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/75018 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:39:31.985Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre?view=revision&revision=1566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1638", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "[oss-security] 20150603 CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match()", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/06/03/7", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228283", }, { name: "75018", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/75018", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-03T00:00:00", descriptions: [ { lang: "en", value: "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-17T16:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre?view=revision&revision=1566", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1638", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "[oss-security] 20150603 CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match()", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/06/03/7", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228283", }, { name: "75018", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/75018", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2015-3217", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "http://vcs.pcre.org/pcre?view=revision&revision=1566", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre?view=revision&revision=1566", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1638", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1638", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "[oss-security] 20150603 CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match()", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/06/03/7", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1228283", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228283", }, { name: "75018", refsource: "BID", url: "http://www.securityfocus.com/bid/75018", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-3217", datePublished: "2016-12-13T16:00:00", dateReserved: "2015-04-10T00:00:00", dateUpdated: "2024-08-06T05:39:31.985Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2106
Vulnerability from cvelistv5
Published
2016-05-05 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.739Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3566", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1035721", }, { name: "RHSA-2016:1648", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1648.html", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3f3582139fbb259a1c3cbb0a25236500a409bf26", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2017-11-01", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { name: "89744", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/89744", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:1649", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1649.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv/20160503.txt", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3566", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1035721", }, { name: "RHSA-2016:1648", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1648.html", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3f3582139fbb259a1c3cbb0a25236500a409bf26", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { url: "https://source.android.com/security/bulletin/pixel/2017-11-01", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { name: "89744", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/89744", }, { url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:1649", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1649.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { url: "https://www.openssl.org/news/secadv/20160503.txt", }, { url: "https://support.apple.com/HT206903", }, { url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2106", datePublished: "2016-05-05T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.739Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-3210
Vulnerability from cvelistv5
Published
2016-12-13 16:00
Modified
2024-08-06 05:39
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
References
â–Ľ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/74934 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
http://www.openwall.com/lists/oss-security/2015/06/01/7 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/02/11 | mailing-list, x_refsource_MLIST | |
https://bugs.exim.org/show_bug.cgi?id=1636 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:39:31.991Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "74934", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/74934", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "[oss-security] 20150601 CVE-2015-3210: PCRE Library Heap Overflow Vulnerability", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/06/01/7", }, { name: "[oss-security] 20151202 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/12/02/11", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1636", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-05-29T00:00:00", descriptions: [ { lang: "en", value: "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "74934", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/74934", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "[oss-security] 20150601 CVE-2015-3210: PCRE Library Heap Overflow Vulnerability", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/06/01/7", }, { name: "[oss-security] 20151202 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/12/02/11", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1636", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2015-3210", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "74934", refsource: "BID", url: "http://www.securityfocus.com/bid/74934", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "[oss-security] 20150601 CVE-2015-3210: PCRE Library Heap Overflow Vulnerability", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/06/01/7", }, { name: "[oss-security] 20151202 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/12/02/11", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1636", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1636", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-3210", datePublished: "2016-12-13T16:00:00", dateReserved: "2015-04-10T00:00:00", dateUpdated: "2024-08-06T05:39:31.991Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9842
Vulnerability from cvelistv5
Published
2017-05-23 03:56
Modified
2024-08-06 02:59
Severity ?
EPSS score ?
Summary
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:59:03.495Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402348", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-30T00:00:00", descriptions: [ { lang: "en", value: "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:16:04", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402348", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@microfocus.com", ID: "CVE-2016-9842", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2017:1221", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", refsource: "BID", url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4292-1/", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "https://support.apple.com/HT208144", refsource: "CONFIRM", url: "https://support.apple.com/HT208144", }, { name: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", refsource: "MISC", url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { name: "https://support.apple.com/HT208113", refsource: "CONFIRM", url: "https://support.apple.com/HT208113", }, { name: "https://support.apple.com/HT208112", refsource: "CONFIRM", url: "https://support.apple.com/HT208112", }, { name: "https://support.apple.com/HT208115", refsource: "CONFIRM", url: "https://support.apple.com/HT208115", }, { name: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", refsource: "MISC", url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1402348", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402348", }, { name: "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958", refsource: "CONFIRM", url: "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958", }, { name: "GLSA-202007-54", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202007-54", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2016-9842", datePublished: "2017-05-23T03:56:00", dateReserved: "2016-12-05T00:00:00", dateUpdated: "2024-08-06T02:59:03.495Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1837
Vulnerability from cvelistv5
Published
2016-05-20 10:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:40.024Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206568", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=760263", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-16T00:00:00", descriptions: [ { lang: "en", value: "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206568", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=760263", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1837", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "https://support.apple.com/HT206567", refsource: "CONFIRM", url: "https://support.apple.com/HT206567", }, { name: "90691", refsource: "BID", url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "https://support.apple.com/HT206566", refsource: "CONFIRM", url: "https://support.apple.com/HT206566", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { name: "https://support.apple.com/HT206564", refsource: "CONFIRM", url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "https://support.apple.com/HT206568", refsource: "CONFIRM", url: "https://support.apple.com/HT206568", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=760263", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=760263", }, { name: "APPLE-SA-2016-05-16-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1837", datePublished: "2016-05-20T10:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:40.024Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4658
Vulnerability from cvelistv5
Published
2016-09-25 10:00
Modified
2024-08-06 00:39
Severity ?
EPSS score ?
Summary
xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:39:25.880Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT207141", }, { name: "1036858", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036858", }, { name: "APPLE-SA-2016-09-20", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html", }, { name: "APPLE-SA-2016-09-20-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html", }, { name: "APPLE-SA-2016-09-20-5", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html", }, { name: "APPLE-SA-2016-09-20-6", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html", }, { name: "93054", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93054", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT207170", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT207142", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT207143", }, { name: "1038623", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038623", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-20T00:00:00", descriptions: [ { lang: "en", value: "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-22T14:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT207141", }, { name: "1036858", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036858", }, { name: "APPLE-SA-2016-09-20", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html", }, { name: "APPLE-SA-2016-09-20-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html", }, { name: "APPLE-SA-2016-09-20-5", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html", }, { name: "APPLE-SA-2016-09-20-6", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html", }, { name: "93054", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93054", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT207170", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT207142", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT207143", }, { name: "1038623", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038623", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-4658", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://support.apple.com/HT207141", refsource: "CONFIRM", url: "https://support.apple.com/HT207141", }, { name: "1036858", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036858", }, { name: "APPLE-SA-2016-09-20", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html", }, { name: "APPLE-SA-2016-09-20-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html", }, { name: "APPLE-SA-2016-09-20-5", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html", }, { name: "APPLE-SA-2016-09-20-6", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html", }, { name: "93054", refsource: "BID", url: "http://www.securityfocus.com/bid/93054", }, { name: "https://support.apple.com/HT207170", refsource: "CONFIRM", url: "https://support.apple.com/HT207170", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "https://support.apple.com/HT207142", refsource: "CONFIRM", url: "https://support.apple.com/HT207142", }, { name: "https://support.apple.com/HT207143", refsource: "CONFIRM", url: "https://support.apple.com/HT207143", }, { name: "1038623", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038623", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-4658", datePublished: "2016-09-25T10:00:00", dateReserved: "2016-05-11T00:00:00", dateUpdated: "2024-08-06T00:39:25.880Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-3238
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 05:39
Severity ?
EPSS score ?
Summary
The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:39:32.046Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2015-10830", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html", }, { name: "RHSA-2015:1640", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1640.html", }, { name: "[oss-security] 20150625 Linux-PAM 1.2.1 released to address CVE-2015-3238", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/06/25/13", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228571", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551", }, { name: "GLSA-201605-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201605-05", }, { name: "USN-2935-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2935-2", }, { name: "USN-2935-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2935-3", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "USN-2935-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2935-1", }, { name: "FEDORA-2015-10848", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html", }, { name: "75428", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/75428", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-25T00:00:00", descriptions: [ { lang: "en", value: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-01T15:57:02", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "FEDORA-2015-10830", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html", }, { name: "RHSA-2015:1640", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1640.html", }, { name: "[oss-security] 20150625 Linux-PAM 1.2.1 released to address CVE-2015-3238", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/06/25/13", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228571", }, { tags: [ "x_refsource_MISC", ], url: "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551", }, { name: "GLSA-201605-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201605-05", }, { name: "USN-2935-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2935-2", }, { name: "USN-2935-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2935-3", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "USN-2935-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2935-1", }, { name: "FEDORA-2015-10848", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html", }, { name: "75428", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/75428", }, { tags: [ "x_refsource_MISC", ], url: "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-3238", datePublished: "2015-08-24T14:00:00", dateReserved: "2015-04-10T00:00:00", dateUpdated: "2024-08-06T05:39:32.046Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6313
Vulnerability from cvelistv5
Published
2016-12-13 20:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.debian.org/security/2016/dsa-3650 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201612-01 | vendor-advisory, x_refsource_GENTOO | |
http://www.ubuntu.com/usn/USN-3064-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2016/dsa-3649 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201610-04 | vendor-advisory, x_refsource_GENTOO | |
http://www.securitytracker.com/id/1036635 | vdb-entry, x_refsource_SECTRACK | |
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html | mailing-list, x_refsource_MLIST | |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-2674.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/92527 | vdb-entry, x_refsource_BID | |
http://www.ubuntu.com/usn/USN-3065-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:18.219Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3650", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3650", }, { name: "GLSA-201612-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-01", }, { name: "USN-3064-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3064-1", }, { name: "DSA-3649", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3649", }, { name: "GLSA-201610-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201610-04", }, { name: "1036635", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036635", }, { name: "[gnupg-announce] 20160817 [Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS", }, { name: "RHSA-2016:2674", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2674.html", }, { name: "92527", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92527", }, { name: "USN-3065-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3065-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-17T00:00:00", descriptions: [ { lang: "en", value: "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "DSA-3650", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3650", }, { name: "GLSA-201612-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201612-01", }, { name: "USN-3064-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3064-1", }, { name: "DSA-3649", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3649", }, { name: "GLSA-201610-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201610-04", }, { name: "1036635", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036635", }, { name: "[gnupg-announce] 20160817 [Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS", }, { name: "RHSA-2016:2674", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2674.html", }, { name: "92527", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92527", }, { name: "USN-3065-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3065-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-6313", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3650", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3650", }, { name: "GLSA-201612-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201612-01", }, { name: "USN-3064-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3064-1", }, { name: "DSA-3649", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3649", }, { name: "GLSA-201610-04", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201610-04", }, { name: "1036635", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036635", }, { name: "[gnupg-announce] 20160817 [Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]", refsource: "MLIST", url: "https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html", }, { name: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS", refsource: "CONFIRM", url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS", }, { name: "RHSA-2016:2674", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2674.html", }, { name: "92527", refsource: "BID", url: "http://www.securityfocus.com/bid/92527", }, { name: "USN-3065-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3065-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-6313", datePublished: "2016-12-13T20:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:18.219Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4429
Vulnerability from cvelistv5
Published
2016-06-10 15:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
References
â–Ľ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/3759-2/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html | vendor-advisory, x_refsource_SUSE | |
https://usn.ubuntu.com/3759-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/102073 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html | mailing-list, x_refsource_MLIST | |
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 | x_refsource_CONFIRM | |
https://www.oracle.com//security-alerts/cpujul2021.html | x_refsource_MISC | |
https://sourceware.org/bugzilla/show_bug.cgi?id=20112 | x_refsource_CONFIRM | |
https://source.android.com/security/bulletin/2017-12-01 | x_refsource_CONFIRM | |
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:24.629Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3759-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3759-2/", }, { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "USN-3759-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3759-1/", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "102073", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/102073", }, { name: "[debian-lts-announce] 20200628 [SECURITY] [DLA 2256-1] libtirpc security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=20112", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2017-12-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-23T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-20T22:53:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-3759-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3759-2/", }, { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "USN-3759-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3759-1/", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "102073", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/102073", }, { name: "[debian-lts-announce] 20200628 [SECURITY] [DLA 2256-1] libtirpc security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=20112", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2017-12-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-4429", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3759-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3759-2/", }, { name: "openSUSE-SU-2016:1779", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "USN-3759-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3759-1/", }, { name: "openSUSE-SU-2016:1527", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "102073", refsource: "BID", url: "http://www.securityfocus.com/bid/102073", }, { name: "[debian-lts-announce] 20200628 [SECURITY] [DLA 2256-1] libtirpc security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { name: "https://www.oracle.com//security-alerts/cpujul2021.html", refsource: "MISC", url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=20112", refsource: "CONFIRM", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=20112", }, { name: "https://source.android.com/security/bulletin/2017-12-01", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2017-12-01", }, { name: "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c", refsource: "CONFIRM", url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-4429", datePublished: "2016-06-10T15:00:00", dateReserved: "2016-05-02T00:00:00", dateUpdated: "2024-08-06T00:32:24.629Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2177
Vulnerability from cvelistv5
Published
2016-06-20 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.601Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2017:1659", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1659.html", }, { name: "RHSA-2017:1658", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1658", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { name: "1036088", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036088", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { tags: [ "x_transferred", ], url: "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=a004e72b95835136d3f1ea90517f706c24c03da7", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "RHSA-2017:0194", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:0194", }, { name: "RHSA-2017:0193", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:0193", }, { tags: [ "x_transferred", ], url: "https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1341705", }, { tags: [ "x_transferred", ], url: "https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/", }, { name: "91319", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91319", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us", }, { tags: [ "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10165", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { name: "[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/9", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/540957/100/0/threaded", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "USN-3181-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3181-1", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/csp/article/K23873366", }, { name: "DSA-3673", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-06-01T00:00:00", descriptions: [ { lang: "en", value: "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2017:1659", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1659.html", }, { name: "RHSA-2017:1658", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1658", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { name: "1036088", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036088", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { url: "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=a004e72b95835136d3f1ea90517f706c24c03da7", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "RHSA-2017:0194", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:0194", }, { name: "RHSA-2017:0193", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:0193", }, { url: "https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1341705", }, { url: "https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/", }, { name: "91319", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91319", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us", }, { url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10165", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { name: "[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2016/06/08/9", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/540957/100/0/threaded", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "USN-3181-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3181-1", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { url: "https://support.f5.com/csp/article/K23873366", }, { name: "DSA-3673", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2177", datePublished: "2016-06-20T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.601Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1234
Vulnerability from cvelistv5
Published
2016-06-01 20:00
Modified
2024-08-05 22:48
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:48:13.662Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2016-68abc0be35", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", }, { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "[oss-security] 20160307 CVE-2016-1234 in glibc glob with GLOB_ALTDIRFUNC", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/03/07/16", }, { name: "GLSA-201702-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201702-11", }, { name: "84204", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/84204", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=19779", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2021/Sep/0", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-03-07T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-01T17:06:13", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "FEDORA-2016-68abc0be35", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", }, { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "[oss-security] 20160307 CVE-2016-1234 in glibc glob with GLOB_ALTDIRFUNC", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/03/07/16", }, { name: "GLSA-201702-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201702-11", }, { name: "84204", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/84204", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=19779", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2021/Sep/0", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2016-1234", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2016-68abc0be35", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", }, { name: "openSUSE-SU-2016:1779", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { name: "[oss-security] 20160307 CVE-2016-1234 in glibc glob with GLOB_ALTDIRFUNC", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/03/07/16", }, { name: "GLSA-201702-11", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201702-11", }, { name: "84204", refsource: "BID", url: "http://www.securityfocus.com/bid/84204", }, { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=19779", refsource: "CONFIRM", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=19779", }, { name: "openSUSE-SU-2016:1527", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea", refsource: "CONFIRM", url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, { name: "20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2021/Sep/0", }, { name: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2016-1234", datePublished: "2016-06-01T20:00:00", dateReserved: "2015-12-27T00:00:00", dateUpdated: "2024-08-05T22:48:13.662Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9063
Vulnerability from cvelistv5
Published
2018-06-11 21:00
Modified
2024-08-06 02:42
Severity ?
EPSS score ?
Summary
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
References
â–Ľ | URL | Tags |
---|---|---|
https://www.debian.org/security/2017/dsa-3898 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/94337 | vdb-entry, x_refsource_BID | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1274777 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037298 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1039427 | vdb-entry, x_refsource_SECTRACK | |
https://www.mozilla.org/security/advisories/mfsa2016-89/ | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:42:10.630Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3898", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2017/dsa-3898", }, { name: "94337", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94337", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1274777", }, { name: "1037298", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037298", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039427", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.mozilla.org/security/advisories/mfsa2016-89/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Firefox", vendor: "Mozilla", versions: [ { lessThan: "50", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2016-11-15T00:00:00", descriptions: [ { lang: "en", value: "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.", }, ], problemTypes: [ { descriptions: [ { description: "Possible integer overflow to fix inside XML_Parse in Expat", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-06-12T09:57:01", orgId: "f16b083a-5664-49f3-a51e-8d479e5ed7fe", shortName: "mozilla", }, references: [ { name: "DSA-3898", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2017/dsa-3898", }, { name: "94337", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94337", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1274777", }, { name: "1037298", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037298", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039427", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.mozilla.org/security/advisories/mfsa2016-89/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mozilla.org", ID: "CVE-2016-9063", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Firefox", version: { version_data: [ { version_affected: "<", version_value: "50", }, ], }, }, ], }, vendor_name: "Mozilla", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Possible integer overflow to fix inside XML_Parse in Expat", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3898", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-3898", }, { name: "94337", refsource: "BID", url: "http://www.securityfocus.com/bid/94337", }, { name: "https://bugzilla.mozilla.org/show_bug.cgi?id=1274777", refsource: "CONFIRM", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1274777", }, { name: "1037298", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037298", }, { name: "1039427", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039427", }, { name: "https://www.mozilla.org/security/advisories/mfsa2016-89/", refsource: "CONFIRM", url: "https://www.mozilla.org/security/advisories/mfsa2016-89/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f16b083a-5664-49f3-a51e-8d479e5ed7fe", assignerShortName: "mozilla", cveId: "CVE-2016-9063", datePublished: "2018-06-11T21:00:00", dateReserved: "2016-10-27T00:00:00", dateUpdated: "2024-08-06T02:42:10.630Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8385
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/85572 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | x_refsource_CONFIRM | |
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-1025.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.881Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "85572", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/85572", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles the /(?|(\\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "85572", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/85572", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8385", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE before 8.38 mishandles the /(?|(\\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "85572", refsource: "BID", url: "http://www.securityfocus.com/bid/85572", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8385", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.881Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-7187
Vulnerability from cvelistv5
Published
2014-09-28 19:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:40:19.211Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60433", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61636", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61636", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61654", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61703", }, { name: "USN-2364-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61622", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61873", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61618", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61479", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61552", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200223", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61855", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60055", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-25T00:00:00", descriptions: [ { lang: "en", value: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-09T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60433", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61636", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61636", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61654", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61703", }, { name: "USN-2364-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61622", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61873", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61618", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61479", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61552", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200223", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61855", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60055", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-7187", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", refsource: "SECUNIA", url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "openSUSE-SU-2014:1254", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://support.novell.com/security/cve/CVE-2014-7187.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61636", refsource: "SECUNIA", url: "http://secunia.com/advisories/61636", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "USN-2364-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61622", refsource: "SECUNIA", url: "http://secunia.com/advisories/61622", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", refsource: "SECUNIA", url: "http://secunia.com/advisories/61873", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", refsource: "SECUNIA", url: "http://secunia.com/advisories/61618", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", refsource: "SECUNIA", url: "http://secunia.com/advisories/61479", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBMU03236", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", refsource: "SECUNIA", url: "http://secunia.com/advisories/61855", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-7187", datePublished: "2014-09-28T19:00:00", dateReserved: "2014-09-25T00:00:00", dateUpdated: "2024-08-06T12:40:19.211Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-3622
Vulnerability from cvelistv5
Published
2015-05-12 19:00
Modified
2024-08-06 05:47
Severity ?
EPSS score ?
Summary
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:47:57.733Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201509-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201509-04", }, { name: "1032246", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1032246", }, { name: "FEDORA-2015-7288", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html", }, { name: "RHSA-2017:1860", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1860", }, { name: "20150430 Heap overflow / invalid read in Libtasn1 before 4.5 (TFPA 005/2015)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2015/Apr/109", }, { name: "DSA-3256", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3256", }, { name: "[help-libtasn1] 20150429 GNU Libtasn1 4.5 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html", }, { name: "openSUSE-SU-2016:1567", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html", }, { name: "MDVSA-2015:232", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232", }, { name: "openSUSE-SU-2015:1372", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html", }, { name: "74419", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/74419", }, { name: "openSUSE-SU-2016:1674", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html", }, { name: "USN-2604-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2604-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-04-29T00:00:00", descriptions: [ { lang: "en", value: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-201509-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201509-04", }, { name: "1032246", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1032246", }, { name: "FEDORA-2015-7288", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html", }, { name: "RHSA-2017:1860", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1860", }, { name: "20150430 Heap overflow / invalid read in Libtasn1 before 4.5 (TFPA 005/2015)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2015/Apr/109", }, { name: "DSA-3256", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3256", }, { name: "[help-libtasn1] 20150429 GNU Libtasn1 4.5 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html", }, { name: "openSUSE-SU-2016:1567", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html", }, { name: "MDVSA-2015:232", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232", }, { name: "openSUSE-SU-2015:1372", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html", }, { name: "74419", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/74419", }, { name: "openSUSE-SU-2016:1674", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html", }, { name: "USN-2604-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2604-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-3622", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201509-04", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201509-04", }, { name: "1032246", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1032246", }, { name: "FEDORA-2015-7288", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html", }, { name: "RHSA-2017:1860", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1860", }, { name: "20150430 Heap overflow / invalid read in Libtasn1 before 4.5 (TFPA 005/2015)", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2015/Apr/109", }, { name: "DSA-3256", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3256", }, { name: "[help-libtasn1] 20150429 GNU Libtasn1 4.5 released", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html", }, { name: "openSUSE-SU-2016:1567", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html", }, { name: "MDVSA-2015:232", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232", }, { name: "openSUSE-SU-2015:1372", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html", }, { name: "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html", }, { name: "74419", refsource: "BID", url: "http://www.securityfocus.com/bid/74419", }, { name: "openSUSE-SU-2016:1674", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html", }, { name: "USN-2604-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2604-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-3622", datePublished: "2015-05-12T19:00:00", dateReserved: "2015-04-30T00:00:00", dateUpdated: "2024-08-06T05:47:57.733Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8806
Vulnerability from cvelistv5
Published
2016-04-13 17:00
Modified
2024-08-06 08:29
Severity ?
EPSS score ?
Summary
dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "<!DOCTYPE html" substring in a crafted HTML document.
References
â–Ľ | URL | Tags |
---|---|---|
https://bugzilla.gnome.org/show_bug.cgi?id=749115 | x_refsource_MISC | |
https://www.debian.org/security/2016/dsa-3593 | vendor-advisory, x_refsource_DEBIAN | |
http://www.ubuntu.com/usn/USN-2994-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2016/02/03/5 | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/201701-37 | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/82071 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:29:22.040Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=749115", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "[oss-security] 20160203 Re: Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/02/03/5", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "82071", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/82071", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-03T00:00:00", descriptions: [ { lang: "en", value: "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=749115", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "[oss-security] 20160203 Re: Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/02/03/5", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "82071", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/82071", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2015-8806", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.gnome.org/show_bug.cgi?id=749115", refsource: "MISC", url: "https://bugzilla.gnome.org/show_bug.cgi?id=749115", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "[oss-security] 20160203 Re: Out-of-bounds Read in the libxml2's htmlParseNameComplex() function", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/02/03/5", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "82071", refsource: "BID", url: "http://www.securityfocus.com/bid/82071", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2015-8806", datePublished: "2016-04-13T17:00:00", dateReserved: "2016-02-03T00:00:00", dateUpdated: "2024-08-06T08:29:22.040Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2012-6702
Vulnerability from cvelistv5
Published
2016-06-16 18:00
Modified
2024-08-06 21:36
Severity ?
EPSS score ?
Summary
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
References
â–Ľ | URL | Tags |
---|---|---|
https://www.tenable.com/security/tns-2016-20 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/91483 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2016/dsa-3597 | vendor-advisory, x_refsource_DEBIAN | |
http://www.openwall.com/lists/oss-security/2016/06/04/1 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2016/06/03/8 | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/201701-21 | vendor-advisory, x_refsource_GENTOO | |
https://source.android.com/security/bulletin/2016-11-01.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-3010-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T21:36:02.049Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "91483", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91483", }, { name: "DSA-3597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3597", }, { name: "[oss-security] 20160603 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/04/1", }, { name: "[oss-security] 20160603 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/03/8", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "USN-3010-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3010-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2012-04-05T00:00:00", descriptions: [ { lang: "en", value: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:15:42", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "91483", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91483", }, { name: "DSA-3597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3597", }, { name: "[oss-security] 20160603 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/04/1", }, { name: "[oss-security] 20160603 Re: expat hash collision fix too predictable?", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/03/8", }, { name: "GLSA-201701-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-21", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "USN-3010-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3010-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@microfocus.com", ID: "CVE-2012-6702", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.tenable.com/security/tns-2016-20", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-20", }, { name: "91483", refsource: "BID", url: "http://www.securityfocus.com/bid/91483", }, { name: "DSA-3597", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3597", }, { name: "[oss-security] 20160603 Re: expat hash collision fix too predictable?", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/04/1", }, { name: "[oss-security] 20160603 Re: expat hash collision fix too predictable?", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/03/8", }, { name: "GLSA-201701-21", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-21", }, { name: "https://source.android.com/security/bulletin/2016-11-01.html", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2016-11-01.html", }, { name: "USN-3010-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3010-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2012-6702", datePublished: "2016-06-16T18:00:00", dateReserved: "2016-06-03T00:00:00", dateUpdated: "2024-08-06T21:36:02.049Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6185
Vulnerability from cvelistv5
Published
2016-08-02 14:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:22:20.675Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2016-eb2592245b", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/", }, { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "USN-3625-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3625-2/", }, { name: "FEDORA-2016-485dff6060", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/", }, { name: "1036260", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036260", }, { name: "DSA-3628", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3628", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7", }, { name: "91685", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91685", }, { name: "[oss-security] 20160707 CVE Request: perl: XSLoader: could load shared library from incorrect location", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/07/1", }, { name: "FEDORA-2016-742bde2be7", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/", }, { name: "[oss-security] 20160708 Re: CVE Request: perl: XSLoader: could load shared library from incorrect location", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/08/5", }, { name: "USN-3625-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3625-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://rt.cpan.org/Public/Bug/Display.html?id=115808", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-07T00:00:00", descriptions: [ { lang: "en", value: "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-01T09:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "FEDORA-2016-eb2592245b", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/", }, { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "USN-3625-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3625-2/", }, { name: "FEDORA-2016-485dff6060", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/", }, { name: "1036260", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036260", }, { name: "DSA-3628", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3628", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7", }, { name: "91685", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91685", }, { name: "[oss-security] 20160707 CVE Request: perl: XSLoader: could load shared library from incorrect location", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/07/1", }, { name: "FEDORA-2016-742bde2be7", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/", }, { name: "[oss-security] 20160708 Re: CVE Request: perl: XSLoader: could load shared library from incorrect location", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/08/5", }, { name: "USN-3625-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3625-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://rt.cpan.org/Public/Bug/Display.html?id=115808", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2016-6185", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2016-eb2592245b", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/", }, { name: "GLSA-201701-75", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-75", }, { name: "USN-3625-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3625-2/", }, { name: "FEDORA-2016-485dff6060", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/", }, { name: "1036260", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036260", }, { name: "DSA-3628", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3628", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7", refsource: "CONFIRM", url: "http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7", }, { name: "91685", refsource: "BID", url: "http://www.securityfocus.com/bid/91685", }, { name: "[oss-security] 20160707 CVE Request: perl: XSLoader: could load shared library from incorrect location", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/07/1", }, { name: "FEDORA-2016-742bde2be7", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/", }, { name: "[oss-security] 20160708 Re: CVE Request: perl: XSLoader: could load shared library from incorrect location", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/08/5", }, { name: "USN-3625-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3625-1/", }, { name: "https://rt.cpan.org/Public/Bug/Display.html?id=115808", refsource: "CONFIRM", url: "https://rt.cpan.org/Public/Bug/Display.html?id=115808", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2016-6185", datePublished: "2016-08-02T14:00:00", dateReserved: "2016-07-08T00:00:00", dateUpdated: "2024-08-06T01:22:20.675Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6318
Vulnerability from cvelistv5
Published
2016-09-07 19:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/08/16/2 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/92478 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201612-25 | vendor-advisory, x_refsource_GENTOO | |
https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:18.454Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160816 cracklib: Stack-based buffer overflow when parsing large GECOS field", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/08/16/2", }, { name: "openSUSE-SU-2016:2204", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html", }, { name: "92478", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92478", }, { name: "GLSA-201612-25", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-25", }, { name: "[debian-lts-announce] 20200524 [SECURITY] [DLA 2220-1] cracklib2 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-16T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:08:05", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "[oss-security] 20160816 cracklib: Stack-based buffer overflow when parsing large GECOS field", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/08/16/2", }, { name: "openSUSE-SU-2016:2204", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html", }, { name: "92478", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92478", }, { name: "GLSA-201612-25", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201612-25", }, { name: "[debian-lts-announce] 20200524 [SECURITY] [DLA 2220-1] cracklib2 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-6318", datePublished: "2016-09-07T19:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:18.454Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-5421
Vulnerability from cvelistv5
Published
2016-08-10 14:00
Modified
2024-08-06 01:01
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:01:00.161Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "SSA:2016-219-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "92306", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92306", }, { name: "DSA-3638", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3638", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20160803C.html", }, { name: "openSUSE-SU-2016:2227", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "1036536", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036536", }, { name: "FEDORA-2016-24316f1f56", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "FEDORA-2016-8354baae0f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-03T00:00:00", descriptions: [ { lang: "en", value: "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "SSA:2016-219-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "92306", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92306", }, { name: "DSA-3638", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3638", }, { tags: [ "x_refsource_MISC", ], url: "https://curl.haxx.se/docs/adv_20160803C.html", }, { name: "openSUSE-SU-2016:2227", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "1036536", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036536", }, { name: "FEDORA-2016-24316f1f56", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "FEDORA-2016-8354baae0f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-5421", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://source.android.com/security/bulletin/2016-12-01.html", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2016-12-01.html", }, { name: "SSA:2016-219-01", refsource: "SLACKWARE", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059", }, { name: "92306", refsource: "BID", url: "http://www.securityfocus.com/bid/92306", }, { name: "DSA-3638", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3638", }, { name: "https://curl.haxx.se/docs/adv_20160803C.html", refsource: "MISC", url: "https://curl.haxx.se/docs/adv_20160803C.html", }, { name: "openSUSE-SU-2016:2227", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "openSUSE-SU-2016:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html", }, { name: "1036536", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036536", }, { name: "FEDORA-2016-24316f1f56", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "FEDORA-2016-8354baae0f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "USN-3048-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3048-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-5421", datePublished: "2016-08-10T14:00:00", dateReserved: "2016-06-10T00:00:00", dateUpdated: "2024-08-06T01:01:00.161Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1840
Vulnerability from cvelistv5
Published
2016-05-20 10:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:40.187Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=757711", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206564", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-16T00:00:00", descriptions: [ { lang: "en", value: "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=757711", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206564", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1840", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "https://support.apple.com/HT206567", refsource: "CONFIRM", url: "https://support.apple.com/HT206567", }, { name: "90691", refsource: "BID", url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=757711", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=757711", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "https://support.apple.com/HT206566", refsource: "CONFIRM", url: "https://support.apple.com/HT206566", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { name: "https://support.apple.com/HT206564", refsource: "CONFIRM", url: "https://support.apple.com/HT206564", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "https://support.apple.com/HT206568", refsource: "CONFIRM", url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1840", datePublished: "2016-05-20T10:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:40.187Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-3627
Vulnerability from cvelistv5
Published
2016-05-17 14:00
Modified
2024-08-06 00:03
Severity ?
EPSS score ?
Summary
The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:03:34.258Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20160503 CVE-2016-3627 CVE-2016-3705: libxml2: stack overflow in xml validator (parser)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2016/May/10", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "openSUSE-SU-2016:1446", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html", }, { name: "openSUSE-SU-2016:1298", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160321 CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/03/21/2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "1035335", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035335", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "84992", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/84992", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "[oss-security] 20160321 Re: CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/03/21/3", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-03-21T00:00:00", descriptions: [ { lang: "en", value: "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20160503 CVE-2016-3627 CVE-2016-3705: libxml2: stack overflow in xml validator (parser)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2016/May/10", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "openSUSE-SU-2016:1446", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html", }, { name: "openSUSE-SU-2016:1298", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160321 CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/03/21/2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "1035335", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035335", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "84992", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/84992", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "[oss-security] 20160321 Re: CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/03/21/3", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-3627", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20160503 CVE-2016-3627 CVE-2016-3705: libxml2: stack overflow in xml validator (parser)", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2016/May/10", }, { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "openSUSE-SU-2016:1446", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html", }, { name: "openSUSE-SU-2016:1298", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160321 CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/03/21/2", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "1035335", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035335", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "84992", refsource: "BID", url: "http://www.securityfocus.com/bid/84992", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "[oss-security] 20160321 Re: CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/03/21/3", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-3627", datePublished: "2016-05-17T14:00:00", dateReserved: "2016-03-21T00:00:00", dateUpdated: "2024-08-06T00:03:34.258Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-3191
Vulnerability from cvelistv5
Published
2016-03-17 23:00
Modified
2024-08-05 23:47
Severity ?
EPSS score ?
Summary
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/84810 | vdb-entry, x_refsource_BID | |
http://vcs.pcre.org/pcre2?view=revision&revision=489 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | x_refsource_CONFIRM | |
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-1025.html | vendor-advisory, x_refsource_REDHAT | |
https://bugs.debian.org/815921 | x_refsource_CONFIRM | |
https://bugs.debian.org/815920 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1311503 | x_refsource_CONFIRM | |
https://bugs.exim.org/show_bug.cgi?id=1791 | x_refsource_CONFIRM | |
https://www.tenable.com/security/tns-2016-18 | x_refsource_CONFIRM | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre?view=revision&revision=1631 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:47:58.389Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "84810", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/84810", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre2?view=revision&revision=489", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.debian.org/815921", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.debian.org/815920", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1311503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1791", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre?view=revision&revision=1631", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-09T00:00:00", descriptions: [ { lang: "en", value: "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "84810", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/84810", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre2?view=revision&revision=489", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.debian.org/815921", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.debian.org/815920", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1311503", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1791", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre?view=revision&revision=1631", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2016-3191", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "84810", refsource: "BID", url: "http://www.securityfocus.com/bid/84810", }, { name: "http://vcs.pcre.org/pcre2?view=revision&revision=489", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre2?view=revision&revision=489", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "https://bugs.debian.org/815921", refsource: "CONFIRM", url: "https://bugs.debian.org/815921", }, { name: "https://bugs.debian.org/815920", refsource: "CONFIRM", url: "https://bugs.debian.org/815920", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1311503", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1311503", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1791", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1791", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre?view=revision&revision=1631", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre?view=revision&revision=1631", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2016-3191", datePublished: "2016-03-17T23:00:00", dateReserved: "2016-03-15T00:00:00", dateUpdated: "2024-08-05T23:47:58.389Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-1000100
Vulnerability from cvelistv5
Published
2017-10-04 01:00
Modified
2024-08-05 21:53
Severity ?
EPSS score ?
Summary
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
References
â–Ľ | URL | Tags |
---|---|---|
https://support.apple.com/HT208221 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100286 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201709-14 | vendor-advisory, x_refsource_GENTOO | |
http://www.securitytracker.com/id/1039118 | vdb-entry, x_refsource_SECTRACK | |
https://curl.haxx.se/docs/adv_20170809B.html | x_refsource_CONFIRM | |
http://www.debian.org/security/2017/dsa-3992 | vendor-advisory, x_refsource_DEBIAN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T21:53:06.527Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208221", }, { name: "100286", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100286", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201709-14", }, { name: "1039118", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039118", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20170809B.html", }, { name: "DSA-3992", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3992", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], dateAssigned: "2017-08-22T00:00:00", datePublic: "2017-10-03T00:00:00", descriptions: [ { lang: "en", value: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208221", }, { name: "100286", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100286", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201709-14", }, { name: "1039118", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039118", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20170809B.html", }, { name: "DSA-3992", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3992", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", DATE_ASSIGNED: "2017-08-22T17:29:33.315894", ID: "CVE-2017-1000100", REQUESTER: "daniel@haxx.se", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://support.apple.com/HT208221", refsource: "CONFIRM", url: "https://support.apple.com/HT208221", }, { name: "100286", refsource: "BID", url: "http://www.securityfocus.com/bid/100286", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201709-14", }, { name: "1039118", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039118", }, { name: "https://curl.haxx.se/docs/adv_20170809B.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20170809B.html", }, { name: "DSA-3992", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3992", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-1000100", datePublished: "2017-10-04T01:00:00", dateReserved: "2017-10-03T00:00:00", dateUpdated: "2024-08-05T21:53:06.527Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-1000366
Vulnerability from cvelistv5
Published
2017-06-19 16:00
Modified
2024-08-05 22:00
Severity ?
EPSS score ?
Summary
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:00:39.873Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", }, { name: "1038712", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038712", }, { name: "42275", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/42275/", }, { name: "RHSA-2017:1712", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1712", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { name: "RHSA-2017:1479", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1479", }, { name: "RHSA-2017:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1480", }, { name: "99127", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/99127", }, { name: "42276", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/42276/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/kb/doc/?id=7020973", }, { name: "RHSA-2017:1567", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1567", }, { name: "42274", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/42274/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/security/cve/CVE-2017-1000366", }, { name: "RHSA-2017:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1481", }, { name: "DSA-3887", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3887", }, { name: "GLSA-201706-19", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201706-19", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10205", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Sep/7", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-06-19T00:00:00", descriptions: [ { lang: "en", value: "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-05T01:06:07", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", }, { name: "1038712", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038712", }, { name: "42275", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/42275/", }, { name: "RHSA-2017:1712", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1712", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { name: "RHSA-2017:1479", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1479", }, { name: "RHSA-2017:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1480", }, { name: "99127", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/99127", }, { name: "42276", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/42276/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/kb/doc/?id=7020973", }, { name: "RHSA-2017:1567", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1567", }, { name: "42274", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/42274/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/security/cve/CVE-2017-1000366", }, { name: "RHSA-2017:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1481", }, { name: "DSA-3887", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3887", }, { name: "GLSA-201706-19", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201706-19", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10205", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Sep/7", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-1000366", REQUESTER: "qsa@qualys.com", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", refsource: "MISC", url: "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", }, { name: "1038712", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038712", }, { name: "42275", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/42275/", }, { name: "RHSA-2017:1712", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1712", }, { name: "https://www.suse.com/security/cve/CVE-2017-1000366/", refsource: "CONFIRM", url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { name: "RHSA-2017:1479", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1479", }, { name: "RHSA-2017:1480", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1480", }, { name: "99127", refsource: "BID", url: "http://www.securityfocus.com/bid/99127", }, { name: "42276", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/42276/", }, { name: "https://www.suse.com/support/kb/doc/?id=7020973", refsource: "CONFIRM", url: "https://www.suse.com/support/kb/doc/?id=7020973", }, { name: "RHSA-2017:1567", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1567", }, { name: "42274", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/42274/", }, { name: "https://access.redhat.com/security/cve/CVE-2017-1000366", refsource: "CONFIRM", url: "https://access.redhat.com/security/cve/CVE-2017-1000366", }, { name: "RHSA-2017:1481", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1481", }, { name: "DSA-3887", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3887", }, { name: "GLSA-201706-19", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201706-19", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10205", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10205", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Sep/7", }, { name: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-1000366", datePublished: "2017-06-19T16:00:00", dateReserved: "2017-06-19T00:00:00", dateUpdated: "2024-08-05T22:00:39.873Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8380
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
https://bugs.exim.org/show_bug.cgi?id=1637 | x_refsource_CONFIRM | |
https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/77695 | vdb-entry, x_refsource_BID | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.587Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1637", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html", }, { name: "FEDORA-2015-afafa29551", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html", }, { name: "77695", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/77695", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1637", }, { tags: [ "x_refsource_MISC", ], url: "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html", }, { name: "FEDORA-2015-afafa29551", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html", }, { name: "77695", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/77695", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8380", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1637", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1637", }, { name: "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html", refsource: "MISC", url: "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html", }, { name: "FEDORA-2015-afafa29551", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html", }, { name: "77695", refsource: "BID", url: "http://www.securityfocus.com/bid/77695", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8380", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.587Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-7526
Vulnerability from cvelistv5
Published
2018-07-26 13:00
Modified
2024-08-05 16:04
Severity ?
EPSS score ?
Summary
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:04:11.873Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3733-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3733-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526", }, { name: "1038915", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038915", }, { name: "DSA-3960", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2017/dsa-3960", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a", }, { name: "DSA-3901", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2017/dsa-3901", }, { name: "USN-3733-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3733-2/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://eprint.iacr.org/2017/627", }, { name: "99338", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/99338", }, { name: "[gnupg-announce] 20170629 Libgcrypt 1.7.8 released to fix CVE-2017-7526", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "libgcrypt", vendor: "GnuPG", versions: [ { status: "affected", version: "1.7.8", }, ], }, ], datePublic: "2017-06-29T00:00:00", descriptions: [ { lang: "en", value: "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-08-16T09:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-3733-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3733-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526", }, { name: "1038915", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038915", }, { name: "DSA-3960", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2017/dsa-3960", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a", }, { name: "DSA-3901", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2017/dsa-3901", }, { name: "USN-3733-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3733-2/", }, { tags: [ "x_refsource_MISC", ], url: "https://eprint.iacr.org/2017/627", }, { name: "99338", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/99338", }, { name: "[gnupg-announce] 20170629 Libgcrypt 1.7.8 released to fix CVE-2017-7526", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2017-7526", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "libgcrypt", version: { version_data: [ { version_value: "1.7.8", }, ], }, }, ], }, vendor_name: "GnuPG", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", }, ], }, impact: { cvss: [ [ { vectorString: "6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-200", }, ], }, ], }, references: { reference_data: [ { name: "USN-3733-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3733-1/", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526", }, { name: "1038915", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038915", }, { name: "DSA-3960", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-3960", }, { name: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a", refsource: "CONFIRM", url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a", }, { name: "DSA-3901", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-3901", }, { name: "USN-3733-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3733-2/", }, { name: "https://eprint.iacr.org/2017/627", refsource: "MISC", url: "https://eprint.iacr.org/2017/627", }, { name: "99338", refsource: "BID", url: "http://www.securityfocus.com/bid/99338", }, { name: "[gnupg-announce] 20170629 Libgcrypt 1.7.8 released to fix CVE-2017-7526", refsource: "MLIST", url: "https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html", }, { name: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9", refsource: "CONFIRM", url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9", }, { name: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce", refsource: "CONFIRM", url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2017-7526", datePublished: "2018-07-26T13:00:00", dateReserved: "2017-04-05T00:00:00", dateUpdated: "2024-08-05T16:04:11.873Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-2616
Vulnerability from cvelistv5
Published
2018-07-27 19:00
Modified
2024-08-05 14:02
Severity ?
EPSS score ?
Summary
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
References
â–Ľ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/96404 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2017:0907 | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2017-0654.html | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201706-02 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2017/dsa-3793 | vendor-advisory, x_refsource_DEBIAN | |
https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038271 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Linux | util-linux |
Version: 2.32.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:02:06.892Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616", }, { name: "96404", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/96404", }, { name: "RHSA-2017:0907", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:0907", }, { name: "RHSA-2017:0654", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0654.html", }, { name: "GLSA-201706-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201706-02", }, { name: "DSA-3793", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2017/dsa-3793", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891", }, { name: "1038271", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038271", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "util-linux", vendor: "Linux", versions: [ { status: "affected", version: "2.32.1", }, ], }, ], datePublic: "2017-02-22T00:00:00", descriptions: [ { lang: "en", value: "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-267", description: "CWE-267", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-28T09:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616", }, { name: "96404", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/96404", }, { name: "RHSA-2017:0907", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:0907", }, { name: "RHSA-2017:0654", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0654.html", }, { name: "GLSA-201706-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201706-02", }, { name: "DSA-3793", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2017/dsa-3793", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891", }, { name: "1038271", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038271", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2017-2616", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "util-linux", version: { version_data: [ { version_value: "2.32.1", }, ], }, }, ], }, vendor_name: "Linux", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", }, ], }, impact: { cvss: [ [ { vectorString: "5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-267", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616", }, { name: "96404", refsource: "BID", url: "http://www.securityfocus.com/bid/96404", }, { name: "RHSA-2017:0907", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:0907", }, { name: "RHSA-2017:0654", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2017-0654.html", }, { name: "GLSA-201706-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201706-02", }, { name: "DSA-3793", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-3793", }, { name: "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891", refsource: "CONFIRM", url: "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891", }, { name: "1038271", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038271", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2017-2616", datePublished: "2018-07-27T19:00:00", dateReserved: "2016-12-01T00:00:00", dateUpdated: "2024-08-05T14:02:06.892Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8382
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1187225 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/76157 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/08/04/3 | mailing-list, x_refsource_MLIST | |
https://bugs.exim.org/show_bug.cgi?id=1537 | x_refsource_CONFIRM | |
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834 | x_refsource_CONFIRM | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.894Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1187225", }, { name: "76157", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/76157", }, { name: "[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/08/04/3", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1537", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-08-04T00:00:00", descriptions: [ { lang: "en", value: "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-23T21:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1187225", }, { name: "76157", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/76157", }, { name: "[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/08/04/3", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1537", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8382", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1187225", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1187225", }, { name: "76157", refsource: "BID", url: "http://www.securityfocus.com/bid/76157", }, { name: "[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/08/04/3", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1537", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1537", }, { name: "http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834", refsource: "CONFIRM", url: "http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8382", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.894Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-2325
Vulnerability from cvelistv5
Published
2020-01-14 16:46
Modified
2024-08-06 05:10
Severity ?
EPSS score ?
Summary
The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
References
â–Ľ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html | x_refsource_MISC | |
https://bugs.exim.org/show_bug.cgi?id=1591 | x_refsource_MISC | |
https://www.pcre.org/original/changelog.txt | x_refsource_CONFIRM | |
https://fortiguard.com/zeroday/FG-VD-15-015 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:10:15.978Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1591", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.pcre.org/original/changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://fortiguard.com/zeroday/FG-VD-15-015", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-05-12T00:00:00", descriptions: [ { lang: "en", value: "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-14T16:46:55", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.exim.org/show_bug.cgi?id=1591", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.pcre.org/original/changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://fortiguard.com/zeroday/FG-VD-15-015", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-2325", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", refsource: "MISC", url: "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1591", refsource: "MISC", url: "https://bugs.exim.org/show_bug.cgi?id=1591", }, { name: "https://www.pcre.org/original/changelog.txt", refsource: "CONFIRM", url: "https://www.pcre.org/original/changelog.txt", }, { name: "https://fortiguard.com/zeroday/FG-VD-15-015", refsource: "MISC", url: "https://fortiguard.com/zeroday/FG-VD-15-015", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-2325", datePublished: "2020-01-14T16:46:55", dateReserved: "2015-03-18T00:00:00", dateUpdated: "2024-08-06T05:10:15.978Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-7511
Vulnerability from cvelistv5
Published
2016-04-19 21:00
Modified
2024-08-06 07:51
Severity ?
EPSS score ?
Summary
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.debian.org/security/2016/dsa-3478 | vendor-advisory, x_refsource_DEBIAN | |
http://www.ubuntu.com/usn/USN-2896-1 | vendor-advisory, x_refsource_UBUNTU | |
https://security.gentoo.org/glsa/201610-04 | vendor-advisory, x_refsource_GENTOO | |
https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2016/dsa-3474 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/83253 | vdb-entry, x_refsource_BID | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html | vendor-advisory, x_refsource_SUSE | |
http://www.cs.tau.ac.IL/~tromer/ecdh/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T07:51:28.436Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3478", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3478", }, { name: "USN-2896-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2896-1", }, { name: "GLSA-201610-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201610-04", }, { name: "[gnupg-announce] 20160209 [Announce] Libgcrypt 1.6.5 with security fix released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html", }, { name: "DSA-3474", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3474", }, { name: "83253", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/83253", }, { name: "FEDORA-2016-83cd045bcc", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/", }, { name: "openSUSE-SU-2016:1227", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.cs.tau.ac.IL/~tromer/ecdh/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-09T00:00:00", descriptions: [ { lang: "en", value: "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "DSA-3478", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3478", }, { name: "USN-2896-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2896-1", }, { name: "GLSA-201610-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201610-04", }, { name: "[gnupg-announce] 20160209 [Announce] Libgcrypt 1.6.5 with security fix released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html", }, { name: "DSA-3474", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3474", }, { name: "83253", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/83253", }, { name: "FEDORA-2016-83cd045bcc", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/", }, { name: "openSUSE-SU-2016:1227", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.cs.tau.ac.IL/~tromer/ecdh/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2015-7511", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3478", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3478", }, { name: "USN-2896-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2896-1", }, { name: "GLSA-201610-04", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201610-04", }, { name: "[gnupg-announce] 20160209 [Announce] Libgcrypt 1.6.5 with security fix released", refsource: "MLIST", url: "https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html", }, { name: "DSA-3474", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3474", }, { name: "83253", refsource: "BID", url: "http://www.securityfocus.com/bid/83253", }, { name: "FEDORA-2016-83cd045bcc", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/", }, { name: "openSUSE-SU-2016:1227", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html", }, { name: "http://www.cs.tau.ac.IL/~tromer/ecdh/", refsource: "MISC", url: "http://www.cs.tau.ac.IL/~tromer/ecdh/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-7511", datePublished: "2016-04-19T21:00:00", dateReserved: "2015-09-29T00:00:00", dateUpdated: "2024-08-06T07:51:28.436Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-9050
Vulnerability from cvelistv5
Published
2017-05-18 06:13
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98568 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2017/dsa-3952 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201711-01 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2017/05/15/1 | x_refsource_MISC | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:21.957Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "98568", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98568", }, { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-18T00:00:00", descriptions: [ { lang: "en", value: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:07:42", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "98568", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98568", }, { name: "DSA-3952", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201711-01", }, { tags: [ "x_refsource_MISC", ], url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9050", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "98568", refsource: "BID", url: "http://www.securityfocus.com/bid/98568", }, { name: "DSA-3952", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3952", }, { name: "GLSA-201711-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201711-01", }, { name: "http://www.openwall.com/lists/oss-security/2017/05/15/1", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2017/05/15/1", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9050", datePublished: "2017-05-18T06:13:00", dateReserved: "2017-05-18T00:00:00", dateUpdated: "2024-08-05T16:55:21.957Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4579
Vulnerability from cvelistv5
Published
2016-06-13 19:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
References
â–Ľ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-2982-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.openwall.com/lists/oss-security/2016/05/11/10 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/201706-22 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2016/05/10/8 | mailing-list, x_refsource_MLIST | |
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:25.906Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-2982-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2982-1", }, { name: "[oss-security] 20160511 Re: CVE request: libksba out-of-bouds read remote DOS issue fixed in 1.3.4", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/11/10", }, { name: "openSUSE-SU-2016:1525", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html", }, { name: "GLSA-201706-22", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201706-22", }, { name: "[oss-security] 20160510 CVE request: libksba out-of-bouds read remote DOS issue fixed in 1.3.4", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/10/8", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:15:35", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { name: "USN-2982-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2982-1", }, { name: "[oss-security] 20160511 Re: CVE request: libksba out-of-bouds read remote DOS issue fixed in 1.3.4", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/11/10", }, { name: "openSUSE-SU-2016:1525", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html", }, { name: "GLSA-201706-22", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201706-22", }, { name: "[oss-security] 20160510 CVE request: libksba out-of-bouds read remote DOS issue fixed in 1.3.4", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/10/8", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@suse.com", ID: "CVE-2016-4579", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-2982-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2982-1", }, { name: "[oss-security] 20160511 Re: CVE request: libksba out-of-bouds read remote DOS issue fixed in 1.3.4", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/05/11/10", }, { name: "openSUSE-SU-2016:1525", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html", }, { name: "GLSA-201706-22", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201706-22", }, { name: "[oss-security] 20160510 CVE request: libksba out-of-bouds read remote DOS issue fixed in 1.3.4", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/05/10/8", }, { name: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64", refsource: "CONFIRM", url: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2016-4579", datePublished: "2016-06-13T19:00:00", dateReserved: "2016-05-11T00:00:00", dateUpdated: "2024-08-06T00:32:25.906Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2037
Vulnerability from cvelistv5
Published
2016-02-22 15:05
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/01/19/4 | mailing-list, x_refsource_MLIST | |
http://www.securitytracker.com/id/1035067 | vdb-entry, x_refsource_SECTRACK | |
http://www.debian.org/security/2016/dsa-3483 | vendor-advisory, x_refsource_DEBIAN | |
http://www.openwall.com/lists/oss-security/2016/01/22/4 | mailing-list, x_refsource_MLIST | |
http://www.ubuntu.com/usn/USN-2906-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/82293 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.061Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160119 CVE request: out-of-bounds write with cpio 2.11", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/01/19/4", }, { name: "1035067", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035067", }, { name: "DSA-3483", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3483", }, { name: "[oss-security] 20160122 Re: CVE request: out-of-bounds write with cpio 2.11", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/01/22/4", }, { name: "USN-2906-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2906-1", }, { name: "82293", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/82293", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-02T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160119 CVE request: out-of-bounds write with cpio 2.11", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/01/19/4", }, { name: "1035067", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035067", }, { name: "DSA-3483", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3483", }, { name: "[oss-security] 20160122 Re: CVE request: out-of-bounds write with cpio 2.11", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/01/22/4", }, { name: "USN-2906-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2906-1", }, { name: "82293", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/82293", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-2037", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160119 CVE request: out-of-bounds write with cpio 2.11", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/01/19/4", }, { name: "1035067", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035067", }, { name: "DSA-3483", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3483", }, { name: "[oss-security] 20160122 Re: CVE request: out-of-bounds write with cpio 2.11", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/01/22/4", }, { name: "USN-2906-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2906-1", }, { name: "82293", refsource: "BID", url: "http://www.securityfocus.com/bid/82293", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-2037", datePublished: "2016-02-22T15:05:00", dateReserved: "2016-01-22T00:00:00", dateUpdated: "2024-08-05T23:17:50.061Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2183
Vulnerability from cvelistv5
Published
2016-09-01 00:00
Modified
2025-03-31 14:15
Severity ?
EPSS score ?
Summary
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2025-03-31T14:15:56.806Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability", }, { url: "https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability", }, { name: "RHSA-2017:3113", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3113", }, { name: "RHSA-2017:0338", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0338.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415", }, { name: "RHSA-2017:3240", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3240", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { name: "RHSA-2017:2709", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2709", }, { name: "92630", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/92630", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10171", }, { name: "RHSA-2017:3239", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { name: "42091", tags: [ "exploit", "x_transferred", ], url: "https://www.exploit-db.com/exploits/42091/", }, { name: "GLSA-201701-65", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-65", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "1036696", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036696", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20160915-0001/", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us", }, { name: "GLSA-201707-01", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201707-01", }, { name: "95568", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/95568", }, { name: "RHSA-2017:3114", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3114", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa133", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2017-09", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116", }, { name: "RHSA-2017:1216", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1216", }, { tags: [ "x_transferred", ], url: "https://wiki.opendaylight.org/view/Security_Advisories", }, { name: "RHSA-2017:2710", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2710", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20170119-0001/", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984", }, { name: "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections", tags: [ "mailing-list", "x_transferred", ], url: "https://www.ietf.org/mail-archive/web/tls/current/msg04560.html", }, { name: "RHSA-2018:2123", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2123", }, { name: "RHSA-2017:0337", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0337.html", }, { name: "RHSA-2017:2708", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2708", }, { name: "RHSA-2017:0336", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0336.html", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388", }, { name: "RHSA-2017:0462", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0462.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/540341/100/0/threaded", }, { name: "USN-3087-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded", }, { name: "USN-3087-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10197", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10186", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { tags: [ "x_transferred", ], url: "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "USN-3194-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3194-1", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { name: "20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information", tags: [ "mailing-list", "x_transferred", ], url: "https://seclists.org/bugtraq/2018/Nov/21", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/csp/article/K13167034", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722", }, { name: "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/542005/100/0/threaded", }, { name: "DSA-3673", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "USN-3372-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3372-1", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2017:0460", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html", }, { name: "SUSE-SU-2017:0490", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html", }, { name: "USN-3270-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3270-1", }, { name: "20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded", }, { tags: [ "x_transferred", ], url: "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { name: "20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/105", }, { name: "openSUSE-SU-2017:0513", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/539885/100/0/threaded", }, { name: "openSUSE-SU-2017:0374", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2017:0346", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "USN-3198-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3198-1", }, { tags: [ "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/105", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403", }, { name: "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/541104/100/0/threaded", }, { name: "SUSE-SU-2017:1444", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { name: "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded", }, { name: "USN-3179-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3179-1", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { name: "RHSA-2019:1245", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1245", }, { name: "RHSA-2019:2859", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2859", }, { name: "RHSA-2020:0451", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2020:0451", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10310", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://sweet32.info/", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { tags: [ "x_transferred", ], url: "https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/2548661", }, { tags: [ "x_transferred", ], url: "https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633", }, { tags: [ "x_transferred", ], url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { tags: [ "x_transferred", ], url: "https://www.sigsac.org/ccs/CCS2016/accepted-papers/", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21991482", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/blog/blog/2016/08/24/sweet32/", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/security/cve/cve-2016-2183", }, { tags: [ "x_transferred", ], url: "https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/", }, { tags: [ "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/", }, { tags: [ "x_transferred", ], url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", x_generator: { engine: "ADPogram 0.0.1", }, }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-24T00:00:00.000Z", descriptions: [ { lang: "en", value: "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00.000Z", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2017:3113", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:3113", }, { name: "RHSA-2017:0338", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0338.html", }, { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415", }, { name: "RHSA-2017:3240", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:3240", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { name: "RHSA-2017:2709", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2709", }, { name: "92630", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/92630", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10171", }, { name: "RHSA-2017:3239", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { name: "42091", tags: [ "exploit", ], url: "https://www.exploit-db.com/exploits/42091/", }, { name: "GLSA-201701-65", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201701-65", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "1036696", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036696", }, { url: "https://security.netapp.com/advisory/ntap-20160915-0001/", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us", }, { name: "GLSA-201707-01", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201707-01", }, { name: "95568", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/95568", }, { name: "RHSA-2017:3114", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:3114", }, { url: "https://bto.bluecoat.com/security-advisory/sa133", }, { url: "https://www.tenable.com/security/tns-2017-09", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116", }, { name: "RHSA-2017:1216", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1216", }, { url: "https://wiki.opendaylight.org/view/Security_Advisories", }, { name: "RHSA-2017:2710", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2710", }, { url: "https://security.netapp.com/advisory/ntap-20170119-0001/", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984", }, { name: "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections", tags: [ "mailing-list", ], url: "https://www.ietf.org/mail-archive/web/tls/current/msg04560.html", }, { name: "RHSA-2018:2123", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2123", }, { name: "RHSA-2017:0337", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0337.html", }, { name: "RHSA-2017:2708", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2708", }, { name: "RHSA-2017:0336", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0336.html", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388", }, { name: "RHSA-2017:0462", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0462.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/540341/100/0/threaded", }, { name: "USN-3087-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded", }, { name: "USN-3087-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10197", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10186", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { url: "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "USN-3194-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3194-1", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { name: "20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information", tags: [ "mailing-list", ], url: "https://seclists.org/bugtraq/2018/Nov/21", }, { url: "https://support.f5.com/csp/article/K13167034", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722", }, { name: "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/542005/100/0/threaded", }, { name: "DSA-3673", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "USN-3372-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3372-1", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2017:0460", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html", }, { name: "SUSE-SU-2017:0490", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html", }, { name: "USN-3270-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3270-1", }, { name: "20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded", }, { url: "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { name: "20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/May/105", }, { name: "openSUSE-SU-2017:0513", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { name: "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/539885/100/0/threaded", }, { name: "openSUSE-SU-2017:0374", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415", }, { url: "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "SUSE-SU-2017:0346", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "USN-3198-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3198-1", }, { url: "http://seclists.org/fulldisclosure/2017/May/105", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403", }, { name: "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/541104/100/0/threaded", }, { name: "SUSE-SU-2017:1444", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { name: "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded", }, { name: "USN-3179-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3179-1", }, { url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { name: "RHSA-2019:1245", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1245", }, { name: "RHSA-2019:2859", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2859", }, { name: "RHSA-2020:0451", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2020:0451", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10310", }, { url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://sweet32.info/", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { url: "https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { url: "https://access.redhat.com/articles/2548661", }, { url: "https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633", }, { url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { url: "https://www.sigsac.org/ccs/CCS2016/accepted-papers/", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21991482", }, { url: "https://www.openssl.org/blog/blog/2016/08/24/sweet32/", }, { url: "https://access.redhat.com/security/cve/cve-2016-2183", }, { url: "https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/", }, { url: "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/", }, { url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697", }, { url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2183", datePublished: "2016-09-01T00:00:00.000Z", dateReserved: "2016-01-29T00:00:00.000Z", dateUpdated: "2025-03-31T14:15:56.806Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1835
Vulnerability from cvelistv5
Published
2016-05-20 10:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:39.633Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206567", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb", }, { name: "90696", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90696", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=759020", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206568", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-16T00:00:00", descriptions: [ { lang: "en", value: "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206567", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb", }, { name: "90696", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90696", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=759020", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206568", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1835", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "https://support.apple.com/HT206567", refsource: "CONFIRM", url: "https://support.apple.com/HT206567", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb", }, { name: "90696", refsource: "BID", url: "http://www.securityfocus.com/bid/90696", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=759020", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=759020", }, { name: "https://support.apple.com/HT206568", refsource: "CONFIRM", url: "https://support.apple.com/HT206568", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1835", datePublished: "2016-05-20T10:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:39.633Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-3705
Vulnerability from cvelistv5
Published
2016-05-17 14:00
Modified
2024-08-06 00:03
Severity ?
EPSS score ?
Summary
The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:03:34.486Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20160503 CVE-2016-3627 CVE-2016-3705: libxml2: stack overflow in xml validator (parser)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2016/May/10", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "openSUSE-SU-2016:1446", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html", }, { name: "openSUSE-SU-2016:1298", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=765207", }, { name: "89854", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/89854", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "20160503 CVE-2016-3627 CVE-2016-3705: libxml2: stack overflow in xml validator (parser)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2016/May/10", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "openSUSE-SU-2016:1446", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html", }, { name: "openSUSE-SU-2016:1298", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=765207", }, { name: "89854", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/89854", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-3705", datePublished: "2016-05-17T14:00:00", dateReserved: "2016-03-30T00:00:00", dateUpdated: "2024-08-06T00:03:34.486Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8394
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.646Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "82990", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/82990", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8394", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.646Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4449
Vulnerability from cvelistv5
Published
2016-06-09 16:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:25.361Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.cybozu.com/ja-jp/article/9735", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "SSA:2016-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "JVN#17535578", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN17535578/index.html", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160525 3 libxml2 issues", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/25/2", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "APPLE-SA-2016-07-18-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html", }, { name: "APPLE-SA-2016-07-18-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html", }, { name: "APPLE-SA-2016-07-18-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206901", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "JVNDB-2017-000066", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html", }, { name: "APPLE-SA-2016-07-18-6", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "90865", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90865", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206905", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206902", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206904", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206899", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-23T00:00:00", descriptions: [ { lang: "en", value: "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-18T01:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.cybozu.com/ja-jp/article/9735", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "SSA:2016-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "JVN#17535578", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN17535578/index.html", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "[oss-security] 20160525 3 libxml2 issues", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/25/2", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "APPLE-SA-2016-07-18-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html", }, { name: "APPLE-SA-2016-07-18-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html", }, { name: "APPLE-SA-2016-07-18-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206901", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "JVNDB-2017-000066", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html", }, { name: "APPLE-SA-2016-07-18-6", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "90865", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90865", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206905", }, { name: "1036348", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036348", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206902", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206904", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206899", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-4449", datePublished: "2016-06-09T16:00:00", dateReserved: "2016-05-02T00:00:00", dateUpdated: "2024-08-06T00:32:25.361Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-5073
Vulnerability from cvelistv5
Published
2016-12-13 16:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T06:32:32.687Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "75430", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/75430", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "[oss-security] 20150626 CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength()", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/06/26/1", }, { name: "[oss-security] 20150626 Re: CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength()", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/06/26/3", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1651", }, { name: "1033154", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033154", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre?view=revision&revision=1571", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-26T00:00:00", descriptions: [ { lang: "en", value: "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-17T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "75430", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/75430", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "[oss-security] 20150626 CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength()", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/06/26/1", }, { name: "[oss-security] 20150626 Re: CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength()", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/06/26/3", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1651", }, { name: "1033154", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033154", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre?view=revision&revision=1571", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-5073", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "75430", refsource: "BID", url: "http://www.securityfocus.com/bid/75430", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "[oss-security] 20150626 CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength()", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/06/26/1", }, { name: "[oss-security] 20150626 Re: CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength()", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/06/26/3", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1651", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1651", }, { name: "1033154", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033154", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup", }, { name: "http://vcs.pcre.org/pcre?view=revision&revision=1571", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre?view=revision&revision=1571", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-5073", datePublished: "2016-12-13T16:00:00", dateReserved: "2015-06-26T00:00:00", dateUpdated: "2024-08-06T06:32:32.687Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8623
Vulnerability from cvelistv5
Published
2018-08-01 06:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:41.010Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102I.html", }, { name: "94106", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94106", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/CVE-2016-8623.patch", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.3, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:06:53", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102I.html", }, { name: "94106", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94106", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/CVE-2016-8623.patch", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8623", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", }, ], }, impact: { cvss: [ [ { vectorString: "3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, ], [ { vectorString: "4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://curl.haxx.se/docs/adv_20161102I.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102I.html", }, { name: "94106", refsource: "BID", url: "http://www.securityfocus.com/bid/94106", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://curl.haxx.se/CVE-2016-8623.patch", refsource: "CONFIRM", url: "https://curl.haxx.se/CVE-2016-8623.patch", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8623", datePublished: "2018-08-01T06:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:41.010Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1833
Vulnerability from cvelistv5
Published
2016-05-20 10:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:39.300Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=636", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=758606", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-16T00:00:00", descriptions: [ { lang: "en", value: "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=636", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=758606", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1833", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "https://support.apple.com/HT206567", refsource: "CONFIRM", url: "https://support.apple.com/HT206567", }, { name: "90691", refsource: "BID", url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=636", refsource: "MISC", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=636", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "https://support.apple.com/HT206566", refsource: "CONFIRM", url: "https://support.apple.com/HT206566", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=758606", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=758606", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { name: "https://support.apple.com/HT206564", refsource: "CONFIRM", url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76", }, { name: "https://support.apple.com/HT206568", refsource: "CONFIRM", url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1833", datePublished: "2016-05-20T10:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:39.300Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9318
Vulnerability from cvelistv5
Published
2016-11-16 00:00
Modified
2024-08-06 02:50
Severity ?
EPSS score ?
Summary
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
References
â–Ľ | URL | Tags |
---|---|---|
https://bugzilla.gnome.org/show_bug.cgi?id=772726 | x_refsource_MISC | |
https://github.com/lsh123/xmlsec/issues/43 | x_refsource_MISC | |
https://usn.ubuntu.com/3739-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.gentoo.org/glsa/201711-01 | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/94347 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/3739-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:50:36.929Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=772726", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/lsh123/xmlsec/issues/43", }, { name: "USN-3739-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3739-1/", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201711-01", }, { name: "94347", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94347", }, { name: "USN-3739-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3739-2/", }, { name: "[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-11-15T00:00:00", descriptions: [ { lang: "en", value: "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-08T22:06:16", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=772726", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/lsh123/xmlsec/issues/43", }, { name: "USN-3739-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3739-1/", }, { name: "GLSA-201711-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201711-01", }, { name: "94347", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94347", }, { name: "USN-3739-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3739-2/", }, { name: "[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-9318", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.gnome.org/show_bug.cgi?id=772726", refsource: "MISC", url: "https://bugzilla.gnome.org/show_bug.cgi?id=772726", }, { name: "https://github.com/lsh123/xmlsec/issues/43", refsource: "MISC", url: "https://github.com/lsh123/xmlsec/issues/43", }, { name: "USN-3739-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3739-1/", }, { name: "GLSA-201711-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201711-01", }, { name: "94347", refsource: "BID", url: "http://www.securityfocus.com/bid/94347", }, { name: "USN-3739-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3739-2/", }, { name: "[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-9318", datePublished: "2016-11-16T00:00:00", dateReserved: "2016-11-14T00:00:00", dateUpdated: "2024-08-06T02:50:36.929Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8617
Vulnerability from cvelistv5
Published
2018-07-31 22:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:41.225Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102C.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/CVE-2016-8617.patch", }, { name: "94097", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94097", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.3, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "CWE-787", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:06:50", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102C.html", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/CVE-2016-8617.patch", }, { name: "94097", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94097", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8617", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", }, ], }, impact: { cvss: [ [ { vectorString: "3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, ], [ { vectorString: "4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://curl.haxx.se/docs/adv_20161102C.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102C.html", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://curl.haxx.se/CVE-2016-8617.patch", refsource: "CONFIRM", url: "https://curl.haxx.se/CVE-2016-8617.patch", }, { name: "94097", refsource: "BID", url: "http://www.securityfocus.com/bid/94097", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8617", datePublished: "2018-07-31T22:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:41.225Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-7796
Vulnerability from cvelistv5
Published
2016-10-13 14:00
Modified
2024-08-06 02:04
Severity ?
EPSS score ?
Summary
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/09/30/1 | mailing-list, x_refsource_MLIST | |
https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet | x_refsource_MISC | |
https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.redhat.com/show_bug.cgi?id=1381911 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2017-0003.html | vendor-advisory, x_refsource_REDHAT | |
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1037320 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/93250 | vdb-entry, x_refsource_BID | |
https://rhn.redhat.com/errata/RHBA-2015-2092.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:04:56.092Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160930 Re: CVE Request: systemd v209+: local denial-of-service attack", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/30/1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/systemd/systemd/issues/4234#issuecomment-250441246", }, { name: "SUSE-SU-2016:2475", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1381911", }, { name: "RHSA-2017:0003", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0003.html", }, { name: "SUSE-SU-2016:2476", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html", }, { name: "1037320", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037320", }, { name: "93250", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93250", }, { name: "RHBA-2015:2092", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHBA-2015-2092.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-28T00:00:00", descriptions: [ { lang: "en", value: "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-27T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160930 Re: CVE Request: systemd v209+: local denial-of-service attack", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/30/1", }, { tags: [ "x_refsource_MISC", ], url: "https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/systemd/systemd/issues/4234#issuecomment-250441246", }, { name: "SUSE-SU-2016:2475", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1381911", }, { name: "RHSA-2017:0003", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0003.html", }, { name: "SUSE-SU-2016:2476", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html", }, { name: "1037320", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037320", }, { name: "93250", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93250", }, { name: "RHBA-2015:2092", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHBA-2015-2092.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-7796", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160930 Re: CVE Request: systemd v209+: local denial-of-service attack", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/30/1", }, { name: "https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet", refsource: "MISC", url: "https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet", }, { name: "https://github.com/systemd/systemd/issues/4234#issuecomment-250441246", refsource: "CONFIRM", url: "https://github.com/systemd/systemd/issues/4234#issuecomment-250441246", }, { name: "SUSE-SU-2016:2475", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1381911", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1381911", }, { name: "RHSA-2017:0003", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2017-0003.html", }, { name: "SUSE-SU-2016:2476", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html", }, { name: "1037320", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037320", }, { name: "93250", refsource: "BID", url: "http://www.securityfocus.com/bid/93250", }, { name: "RHBA-2015:2092", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHBA-2015-2092.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-7796", datePublished: "2016-10-13T14:00:00", dateReserved: "2016-09-09T00:00:00", dateUpdated: "2024-08-06T02:04:56.092Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-1000101
Vulnerability from cvelistv5
Published
2017-10-04 01:00
Modified
2024-08-05 21:53
Severity ?
EPSS score ?
Summary
curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.
References
â–Ľ | URL | Tags |
---|---|---|
https://support.apple.com/HT208221 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201709-14 | vendor-advisory, x_refsource_GENTOO | |
https://curl.haxx.se/docs/adv_20170809A.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039117 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/100249 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2017/dsa-3992 | vendor-advisory, x_refsource_DEBIAN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T21:53:06.565Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208221", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201709-14", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20170809A.html", }, { name: "1039117", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039117", }, { name: "100249", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100249", }, { name: "DSA-3992", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3992", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], dateAssigned: "2017-08-22T00:00:00", datePublic: "2017-10-03T00:00:00", descriptions: [ { lang: "en", value: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208221", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201709-14", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20170809A.html", }, { name: "1039117", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039117", }, { name: "100249", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100249", }, { name: "DSA-3992", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3992", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", DATE_ASSIGNED: "2017-08-22T17:29:33.316423", ID: "CVE-2017-1000101", REQUESTER: "daniel@haxx.se", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://support.apple.com/HT208221", refsource: "CONFIRM", url: "https://support.apple.com/HT208221", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201709-14", }, { name: "https://curl.haxx.se/docs/adv_20170809A.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20170809A.html", }, { name: "1039117", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039117", }, { name: "100249", refsource: "BID", url: "http://www.securityfocus.com/bid/100249", }, { name: "DSA-3992", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3992", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-1000101", datePublished: "2017-10-04T01:00:00", dateReserved: "2017-10-03T00:00:00", dateUpdated: "2024-08-05T21:53:06.565Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6304
Vulnerability from cvelistv5
Published
2016-09-26 00:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:18.286Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv/20160922.txt", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2017:1659", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1659.html", }, { name: "RHSA-2017:1658", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1658", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { name: "93150", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/93150", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "RHSA-2016:2802", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2802.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "RHSA-2017:1801", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1801", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { name: "1036878", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036878", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { name: "RHSA-2017:1413", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1413", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { name: "RHSA-2017:2494", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2494", }, { name: "1037640", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1037640", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10171", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=2c0d295e26306e15a92eb23a84a1802005c1c137", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "RHSA-2017:1414", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1414", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { name: "RHSA-2017:1415", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1415.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { name: "RHSA-2017:1802", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1802", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { name: "RHSA-2017:2493", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2493", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "20161012 New OpenSSL double-free and invalid free vulnerabilities in X509 parsing", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2016/Oct/62", }, { name: "USN-3087-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "20161214 APPLE-SA-2016-12-13-1 macOS 10.12.2", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2016/Dec/47", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { name: "DSA-3673", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { name: "openSUSE-SU-2016:2788", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "openSUSE-SU-2016:2769", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-22T00:00:00", descriptions: [ { lang: "en", value: "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.openssl.org/news/secadv/20160922.txt", }, { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2017:1659", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1659.html", }, { name: "RHSA-2017:1658", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1658", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { name: "93150", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/93150", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "RHSA-2016:2802", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2802.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "RHSA-2017:1801", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1801", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { name: "1036878", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036878", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { name: "RHSA-2017:1413", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1413", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { name: "RHSA-2017:2494", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2494", }, { name: "1037640", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1037640", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10171", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=2c0d295e26306e15a92eb23a84a1802005c1c137", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { name: "RHSA-2017:1414", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1414", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { name: "RHSA-2017:1415", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2017-1415.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { name: "RHSA-2017:1802", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:1802", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { name: "RHSA-2017:2493", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2493", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "20161012 New OpenSSL double-free and invalid free vulnerabilities in X509 parsing", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2016/Oct/62", }, { name: "USN-3087-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "20161214 APPLE-SA-2016-12-13-1 macOS 10.12.2", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2016/Dec/47", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { name: "DSA-3673", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { url: "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { name: "openSUSE-SU-2016:2788", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "openSUSE-SU-2016:2769", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-6304", datePublished: "2016-09-26T00:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:18.286Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-8964
Vulnerability from cvelistv5
Published
2014-12-16 18:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:33:12.895Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2014-17624", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html", }, { name: "openSUSE-SU-2015:0858", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "71206", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71206", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.exim.org/viewvc/pcre?view=revision&revision=1513", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0534.html", }, { name: "FEDORA-2014-17642", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html", }, { name: "FEDORA-2014-15573", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html", }, { name: "[oss-security] 20141121 Re: CVE request: heap buffer overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2014/11/21/6", }, { name: "RHSA-2015:0330", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0330.html", }, { name: "FEDORA-2014-17626", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html", }, { name: "MDVSA-2015:002", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:002", }, { name: "MDVSA-2015:137", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:137", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1166147", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.exim.org/show_bug.cgi?id=1546", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-11-19T00:00:00", descriptions: [ { lang: "en", value: "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "FEDORA-2014-17624", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html", }, { name: "openSUSE-SU-2015:0858", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "71206", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71206", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.exim.org/viewvc/pcre?view=revision&revision=1513", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0534.html", }, { name: "FEDORA-2014-17642", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html", }, { name: "FEDORA-2014-15573", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html", }, { name: "[oss-security] 20141121 Re: CVE request: heap buffer overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2014/11/21/6", }, { name: "RHSA-2015:0330", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0330.html", }, { name: "FEDORA-2014-17626", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html", }, { name: "MDVSA-2015:002", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:002", }, { name: "MDVSA-2015:137", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:137", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1166147", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.exim.org/show_bug.cgi?id=1546", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-8964", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2014-17624", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html", }, { name: "openSUSE-SU-2015:0858", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "71206", refsource: "BID", url: "http://www.securityfocus.com/bid/71206", }, { name: "http://www.exim.org/viewvc/pcre?view=revision&revision=1513", refsource: "CONFIRM", url: "http://www.exim.org/viewvc/pcre?view=revision&revision=1513", }, { name: "http://advisories.mageia.org/MGASA-2014-0534.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0534.html", }, { name: "FEDORA-2014-17642", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html", }, { name: "FEDORA-2014-15573", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html", }, { name: "[oss-security] 20141121 Re: CVE request: heap buffer overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2014/11/21/6", }, { name: "RHSA-2015:0330", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0330.html", }, { name: "FEDORA-2014-17626", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html", }, { name: "MDVSA-2015:002", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:002", }, { name: "MDVSA-2015:137", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:137", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1166147", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1166147", }, { name: "http://bugs.exim.org/show_bug.cgi?id=1546", refsource: "CONFIRM", url: "http://bugs.exim.org/show_bug.cgi?id=1546", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-8964", datePublished: "2014-12-16T18:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T13:33:12.895Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9843
Vulnerability from cvelistv5
Published
2017-05-23 03:56
Modified
2024-08-06 02:59
Severity ?
EPSS score ?
Summary
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:59:03.637Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "1041888", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041888", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402351", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20181018-0002/", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-30T00:00:00", descriptions: [ { lang: "en", value: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:15:49", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "1041888", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041888", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402351", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20181018-0002/", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@microfocus.com", ID: "CVE-2016-9843", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2017:1221", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", refsource: "BID", url: "http://www.securityfocus.com/bid/95131", }, { name: "1041888", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041888", }, { name: "RHSA-2017:3046", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4292-1/", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "https://support.apple.com/HT208144", refsource: "CONFIRM", url: "https://support.apple.com/HT208144", }, { name: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", refsource: "MISC", url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { name: "https://support.apple.com/HT208113", refsource: "CONFIRM", url: "https://support.apple.com/HT208113", }, { name: "https://support.apple.com/HT208112", refsource: "CONFIRM", url: "https://support.apple.com/HT208112", }, { name: "https://support.apple.com/HT208115", refsource: "CONFIRM", url: "https://support.apple.com/HT208115", }, { name: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", refsource: "MISC", url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { name: "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811", refsource: "CONFIRM", url: "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1402351", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402351", }, { name: "https://security.netapp.com/advisory/ntap-20181018-0002/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20181018-0002/", }, { name: "GLSA-202007-54", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202007-54", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2016-9843", datePublished: "2017-05-23T03:56:00", dateReserved: "2016-12-05T00:00:00", dateUpdated: "2024-08-06T02:59:03.637Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-7543
Vulnerability from cvelistv5
Published
2017-01-19 20:00
Modified
2024-08-06 02:04
Severity ?
EPSS score ?
Summary
Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:04:54.955Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2017:0725", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0725.html", }, { name: "FEDORA-2016-5a54fb4784", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OU3C756YPHDAAPFX76UGZBAQQQ5UMHS5/", }, { name: "RHSA-2017:1931", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1931", }, { name: "FEDORA-2016-2c4b5ad64e", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7XOQSHU63Y357NHU5FPTFBM6I3YOCQB/", }, { name: "[oss-security] 20160926 CVE-2016-7543 -- bash SHELLOPTS+PS4", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/09/26/9", }, { name: "[bug-bash] 20160916 Bash-4.4 Release available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00018.html", }, { name: "93183", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93183", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115", }, { name: "FEDORA-2016-f84391516d", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2VRBSIPZDZ75ZQ2DLITHUIDW4W26KVR/", }, { name: "1037812", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037812", }, { name: "GLSA-201701-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-16T00:00:00", descriptions: [ { lang: "en", value: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2017:0725", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2017-0725.html", }, { name: "FEDORA-2016-5a54fb4784", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OU3C756YPHDAAPFX76UGZBAQQQ5UMHS5/", }, { name: "RHSA-2017:1931", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1931", }, { name: "FEDORA-2016-2c4b5ad64e", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7XOQSHU63Y357NHU5FPTFBM6I3YOCQB/", }, { name: "[oss-security] 20160926 CVE-2016-7543 -- bash SHELLOPTS+PS4", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/09/26/9", }, { name: "[bug-bash] 20160916 Bash-4.4 Release available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00018.html", }, { name: "93183", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93183", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115", }, { name: "FEDORA-2016-f84391516d", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2VRBSIPZDZ75ZQ2DLITHUIDW4W26KVR/", }, { name: "1037812", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037812", }, { name: "GLSA-201701-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-7543", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2017:0725", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2017-0725.html", }, { name: "FEDORA-2016-5a54fb4784", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OU3C756YPHDAAPFX76UGZBAQQQ5UMHS5/", }, { name: "RHSA-2017:1931", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1931", }, { name: "FEDORA-2016-2c4b5ad64e", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7XOQSHU63Y357NHU5FPTFBM6I3YOCQB/", }, { name: "[oss-security] 20160926 CVE-2016-7543 -- bash SHELLOPTS+PS4", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/09/26/9", }, { name: "[bug-bash] 20160916 Bash-4.4 Release available", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00018.html", }, { name: "93183", refsource: "BID", url: "http://www.securityfocus.com/bid/93183", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115", }, { name: "FEDORA-2016-f84391516d", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2VRBSIPZDZ75ZQ2DLITHUIDW4W26KVR/", }, { name: "1037812", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037812", }, { name: "GLSA-201701-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-7543", datePublished: "2017-01-19T20:00:00", dateReserved: "2016-09-09T00:00:00", dateUpdated: "2024-08-06T02:04:54.955Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-9840
Vulnerability from cvelistv5
Published
2017-05-23 03:56
Modified
2024-08-06 02:59
Severity ?
EPSS score ?
Summary
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:59:03.590Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402345", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-30T00:00:00", descriptions: [ { lang: "en", value: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:16:02", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { name: "RHSA-2017:1221", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4292-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208144", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402345", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208113", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208112", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT208115", }, { tags: [ "x_refsource_MISC", ], url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { name: "GLSA-202007-54", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202007-54", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@microfocus.com", ID: "CVE-2016-9840", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2017:1221", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1221", }, { name: "RHSA-2017:1220", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1220", }, { name: "RHSA-2017:3047", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3047", }, { name: "[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/12/05/21", }, { name: "95131", refsource: "BID", url: "http://www.securityfocus.com/bid/95131", }, { name: "RHSA-2017:3046", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3046", }, { name: "openSUSE-SU-2017:0077", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", }, { name: "GLSA-201701-56", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-56", }, { name: "1039427", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039427", }, { name: "RHSA-2017:1222", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:1222", }, { name: "openSUSE-SU-2017:0080", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", }, { name: "RHSA-2017:3453", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3453", }, { name: "openSUSE-SU-2016:3202", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", }, { name: "RHSA-2017:2999", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2999", }, { name: "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", }, { name: "USN-4246-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4246-1/", }, { name: "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", }, { name: "USN-4292-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4292-1/", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "https://support.apple.com/HT208144", refsource: "CONFIRM", url: "https://support.apple.com/HT208144", }, { name: "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0", refsource: "CONFIRM", url: "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0", }, { name: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", refsource: "MISC", url: "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1402345", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1402345", }, { name: "https://support.apple.com/HT208113", refsource: "CONFIRM", url: "https://support.apple.com/HT208113", }, { name: "https://support.apple.com/HT208112", refsource: "CONFIRM", url: "https://support.apple.com/HT208112", }, { name: "https://support.apple.com/HT208115", refsource: "CONFIRM", url: "https://support.apple.com/HT208115", }, { name: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", refsource: "MISC", url: "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", }, { name: "GLSA-202007-54", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202007-54", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2016-9840", datePublished: "2017-05-23T03:56:00", dateReserved: "2016-12-05T00:00:00", dateUpdated: "2024-08-06T02:59:03.590Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2109
Vulnerability from cvelistv5
Published
2016-05-05 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.542Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3566", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/2017-07-01", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1035721", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c62981390d6cf9e3d612c489b8b77c2913b25807", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "87940", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/87940", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv/20160503.txt", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa123", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149", }, { name: "SSA:2016-124-01", tags: [ "vendor-advisory", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "DSA-3566", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { url: "https://source.android.com/security/bulletin/2017-07-01", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1035721", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { url: "https://www.tenable.com/security/tns-2016-18", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c62981390d6cf9e3d612c489b8b77c2913b25807", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "87940", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/87940", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { name: "FreeBSD-SA-16:17", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc", }, { url: "https://www.openssl.org/news/secadv/20160503.txt", }, { url: "https://support.apple.com/HT206903", }, { url: "https://bto.bluecoat.com/security-advisory/sa123", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2109", datePublished: "2016-05-05T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.542Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6306
Vulnerability from cvelistv5
Published
2016-09-26 00:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:18.287Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2018:2185", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2185", }, { name: "RHSA-2018:2186", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2186", }, { name: "93153", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/93153", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { name: "1036885", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036885", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { name: "RHSA-2018:2187", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2187", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { name: "DSA-3673", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/csp/article/K90492697", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv/20160922.txt", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-22T00:00:00", descriptions: [ { lang: "en", value: "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2018:2185", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2185", }, { name: "RHSA-2018:2186", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2186", }, { name: "93153", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/93153", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { name: "1036885", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036885", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "SUSE-SU-2016:2470", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html", }, { name: "RHSA-2018:2187", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2187", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10215", }, { name: "SUSE-SU-2017:2700", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", }, { name: "USN-3087-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-1", }, { name: "SUSE-SU-2016:2469", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html", }, { name: "openSUSE-SU-2016:2537", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html", }, { name: "USN-3087-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-3087-2", }, { name: "SUSE-SU-2017:2699", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", }, { name: "openSUSE-SU-2016:2407", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html", }, { name: "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2017/Jul/31", }, { name: "SUSE-SU-2016:2458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us", }, { name: "DSA-3673", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3673", }, { name: "openSUSE-SU-2016:2391", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html", }, { name: "openSUSE-SU-2018:0458", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html", }, { name: "SUSE-SU-2016:2387", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448", }, { url: "https://support.f5.com/csp/article/K90492697", }, { name: "SUSE-SU-2016:2468", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html", }, { name: "openSUSE-SU-2016:2496", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html", }, { name: "SUSE-SU-2016:2394", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html", }, { url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en", }, { url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://www.openssl.org/news/secadv/20160922.txt", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9", }, { url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-6306", datePublished: "2016-09-26T00:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:18.287Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2108
Vulnerability from cvelistv5
Published
2016-05-05 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.714Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SSA:2016-124-01", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { name: "DSA-3566", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1035721", }, { tags: [ "x_transferred", ], url: "http://support.citrix.com/article/CTX212736", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "RHSA-2017:0194", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:0194", }, { tags: [ "x_transferred", ], url: "http://source.android.com/security/bulletin/2016-07-01.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804", }, { name: "RHSA-2017:0193", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:0193", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { tags: [ "x_transferred", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv/20160503.txt", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT206903", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "89752", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/89752", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { name: "RHSA-2016:1137", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1137", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SSA:2016-124-01", tags: [ "vendor-advisory", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "openSUSE-SU-2016:1238", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html", }, { name: "openSUSE-SU-2016:1242", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html", }, { name: "SUSE-SU-2016:1267", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html", }, { name: "RHSA-2016:2073", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2073.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", }, { name: "DSA-3566", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3566", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { url: "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "openSUSE-SU-2016:1243", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { name: "SUSE-SU-2016:1228", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html", }, { name: "1035721", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1035721", }, { url: "http://support.citrix.com/article/CTX212736", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27", }, { name: "openSUSE-SU-2016:1239", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html", }, { name: "SUSE-SU-2016:1206", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345", }, { name: "FEDORA-2016-1e39d934ed", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html", }, { name: "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", }, { name: "SUSE-SU-2016:1231", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "FEDORA-2016-1411324654", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html", }, { name: "openSUSE-SU-2016:1240", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", }, { name: "openSUSE-SU-2016:1241", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html", }, { name: "APPLE-SA-2016-07-18-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", }, { name: "SUSE-SU-2016:1360", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html", }, { url: "https://www.tenable.com/security/tns-2016-18", }, { name: "SUSE-SU-2016:1233", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html", }, { name: "RHSA-2017:0194", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:0194", }, { url: "http://source.android.com/security/bulletin/2016-07-01.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804", }, { name: "RHSA-2017:0193", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:0193", }, { name: "openSUSE-SU-2016:1237", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", }, { name: "RHSA-2016:0996", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0996.html", }, { url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr", }, { url: "https://security.netapp.com/advisory/ntap-20160504-0001/", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "SUSE-SU-2016:1290", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html", }, { name: "openSUSE-SU-2016:1273", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "USN-2959-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2959-1", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "RHSA-2016:0722", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0722.html", }, { url: "https://www.openssl.org/news/secadv/20160503.txt", }, { url: "https://support.apple.com/HT206903", }, { url: "https://bto.bluecoat.com/security-advisory/sa123", }, { name: "89752", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/89752", }, { name: "FEDORA-2016-05c567df1a", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html", }, { name: "RHSA-2016:1137", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2016:1137", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2108", datePublished: "2016-05-05T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.714Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1839
Vulnerability from cvelistv5
Published
2016-05-20 10:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:39.919Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=758605", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "1038623", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038623", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-16T00:00:00", descriptions: [ { lang: "en", value: "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=758605", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "1038623", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038623", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1839", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=758605", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=758605", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "https://support.apple.com/HT206567", refsource: "CONFIRM", url: "https://support.apple.com/HT206567", }, { name: "90691", refsource: "BID", url: "http://www.securityfocus.com/bid/90691", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "https://support.apple.com/HT206566", refsource: "CONFIRM", url: "https://support.apple.com/HT206566", }, { name: "https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { name: "https://support.apple.com/HT206564", refsource: "CONFIRM", url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "GLSA-201701-37", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-37", }, { name: "1035890", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "1038623", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038623", }, { name: "https://support.apple.com/HT206568", refsource: "CONFIRM", url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1839", datePublished: "2016-05-20T10:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:39.919Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8381
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/76187 | vdb-entry, x_refsource_BID | |
https://bugs.exim.org/show_bug.cgi?id=1667 | x_refsource_CONFIRM | |
https://bugs.exim.org/show_bug.cgi?id=1672 | x_refsource_CONFIRM | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.417Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "76187", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/76187", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1667", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1672", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\\z(?|(?'R')(\\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "76187", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/76187", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1667", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1672", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8381", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\\z(?|(?'R')(\\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "76187", refsource: "BID", url: "http://www.securityfocus.com/bid/76187", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1667", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1667", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1672", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1672", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8381", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.417Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-4574
Vulnerability from cvelistv5
Published
2016-06-13 19:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/05/10/3 | mailing-list, x_refsource_MLIST | |
http://www.ubuntu.com/usn/USN-2982-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html | vendor-advisory, x_refsource_SUSE | |
http://www.openwall.com/lists/oss-security/2016/05/10/4 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html | vendor-advisory, x_refsource_SUSE | |
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=6be61daac047d8e6aa941eb103f8e71a1d4e3c75 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:25.868Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160510 Re: Re: CVE request: three issues in libksba", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/10/3", }, { name: "USN-2982-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2982-1", }, { name: "openSUSE-SU-2016:1525", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html", }, { name: "[oss-security] 20160510 Re: CVE request: three issues in libksba", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/05/10/4", }, { name: "openSUSE-SU-2016:1370", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=6be61daac047d8e6aa941eb103f8e71a1d4e3c75", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-03T00:00:00", descriptions: [ { lang: "en", value: "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-06-15T11:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160510 Re: Re: CVE request: three issues in libksba", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/10/3", }, { name: "USN-2982-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2982-1", }, { name: "openSUSE-SU-2016:1525", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html", }, { name: "[oss-security] 20160510 Re: CVE request: three issues in libksba", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/05/10/4", }, { name: "openSUSE-SU-2016:1370", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=6be61daac047d8e6aa941eb103f8e71a1d4e3c75", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-4574", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160510 Re: Re: CVE request: three issues in libksba", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/05/10/3", }, { name: "USN-2982-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2982-1", }, { name: "openSUSE-SU-2016:1525", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html", }, { name: "[oss-security] 20160510 Re: CVE request: three issues in libksba", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/05/10/4", }, { name: "openSUSE-SU-2016:1370", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html", }, { name: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=6be61daac047d8e6aa941eb103f8e71a1d4e3c75", refsource: "CONFIRM", url: "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=6be61daac047d8e6aa941eb103f8e71a1d4e3c75", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-4574", datePublished: "2016-06-13T19:00:00", dateReserved: "2016-05-10T00:00:00", dateUpdated: "2024-08-06T00:32:25.868Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-5011
Vulnerability from cvelistv5
Published
2017-04-11 15:00
Modified
2024-08-06 00:46
Severity ?
EPSS score ?
Summary
The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
References
â–Ľ | URL | Tags |
---|---|---|
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/91683 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1036272 | vdb-entry, x_refsource_SECTRACK | |
http://www.openwall.com/lists/oss-security/2016/07/11/2 | mailing-list, x_refsource_MLIST | |
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801 | x_refsource_CONFIRM | |
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-2605.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:46:40.241Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3", }, { name: "91683", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91683", }, { name: "1036272", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036272", }, { name: "[oss-security] 20160711 CVE-2016-5011: util-linux: Extended partition loop in MBR partition table leads to DoS", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/11/2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543", }, { name: "RHSA-2016:2605", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2605.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-11T00:00:00", descriptions: [ { lang: "en", value: "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-04-11T15:57:02", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3", }, { name: "91683", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91683", }, { name: "1036272", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036272", }, { name: "[oss-security] 20160711 CVE-2016-5011: util-linux: Extended partition loop in MBR partition table leads to DoS", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/11/2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543", }, { name: "RHSA-2016:2605", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2605.html", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-5011", datePublished: "2017-04-11T15:00:00", dateReserved: "2016-05-24T00:00:00", dateUpdated: "2024-08-06T00:46:40.241Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8383
Vulnerability from cvelistv5
Published
2015-12-02 00:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.594Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "FEDORA-2015-eb896290d3", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { url: "https://bto.bluecoat.com/security-advisory/sa128", }, { url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201607-02", }, { url: "https://security.netapp.com/advisory/ntap-20230216-0002/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8383", datePublished: "2015-12-02T00:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.594Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8616
Vulnerability from cvelistv5
Published
2018-08-01 06:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/94094 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://curl.haxx.se/docs/adv_20161102B.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616 | x_refsource_CONFIRM | |
https://curl.haxx.se/CVE-2016-8616.patch | x_refsource_CONFIRM | |
https://www.tenable.com/security/tns-2016-21 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037192 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:2486 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201701-47 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:40.954Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "94094", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94094", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102B.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/CVE-2016-8616.patch", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-592", description: "CWE-592", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "94094", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94094", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102B.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/CVE-2016-8616.patch", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8616", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", }, ], }, impact: { cvss: [ [ { vectorString: "3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, ], [ { vectorString: "2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-592", }, ], }, ], }, references: { reference_data: [ { name: "94094", refsource: "BID", url: "http://www.securityfocus.com/bid/94094", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "https://curl.haxx.se/docs/adv_20161102B.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102B.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616", }, { name: "https://curl.haxx.se/CVE-2016-8616.patch", refsource: "CONFIRM", url: "https://curl.haxx.se/CVE-2016-8616.patch", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8616", datePublished: "2018-08-01T06:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:40.954Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-2327
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 05:10
Severity ?
EPSS score ?
Summary
PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
http://www.fortiguard.com/advisory/FG-VD-15-010/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/74924 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
https://bugs.exim.org/show_bug.cgi?id=1503 | x_refsource_CONFIRM | |
https://jira.mongodb.org/browse/SERVER-17252 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:10:16.164Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-VD-15-010/", }, { name: "74924", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/74924", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://jira.mongodb.org/browse/SERVER-17252", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_MISC", ], url: "http://www.fortiguard.com/advisory/FG-VD-15-010/", }, { name: "74924", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/74924", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1503", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://jira.mongodb.org/browse/SERVER-17252", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-2327", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "http://www.fortiguard.com/advisory/FG-VD-15-010/", refsource: "MISC", url: "http://www.fortiguard.com/advisory/FG-VD-15-010/", }, { name: "74924", refsource: "BID", url: "http://www.securityfocus.com/bid/74924", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1503", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1503", }, { name: "https://jira.mongodb.org/browse/SERVER-17252", refsource: "CONFIRM", url: "https://jira.mongodb.org/browse/SERVER-17252", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-2327", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-03-18T00:00:00", dateUpdated: "2024-08-06T05:10:16.164Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8384
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.536Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8384", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8384", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.536Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2180
Vulnerability from cvelistv5
Published
2016-08-01 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:17:50.695Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { name: "1036486", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036486", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-16", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1359615", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { name: "92117", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/92117", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-21T00:00:00", descriptions: [ { lang: "en", value: "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { name: "1036486", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036486", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "GLSA-201612-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201612-16", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1359615", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { name: "92117", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/92117", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-2180", datePublished: "2016-08-01T00:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-05T23:17:50.695Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6303
Vulnerability from cvelistv5
Published
2016-09-16 00:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:18.225Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { name: "1036885", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036885", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "92984", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/92984", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1370146", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=55d83bf7c10c7b205fffa23fa7c3977491e56c07", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-24T00:00:00", descriptions: [ { lang: "en", value: "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.tenable.com/security/tns-2016-20", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { name: "1036885", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036885", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "92984", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/92984", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1370146", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=55d83bf7c10c7b205fffa23fa7c3977491e56c07", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-6303", datePublished: "2016-09-16T00:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:18.225Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6261
Vulnerability from cvelistv5
Published
2016-09-07 20:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:22:20.661Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3658", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[help-libidn] 20150709 out of bounds stack read in function idna_to_ascii_4i", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-07-09T00:00:00", descriptions: [ { lang: "en", value: "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:09:22", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "92070", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3658", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { name: "USN-3068-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[help-libidn] 20150709 out of bounds stack read in function idna_to_ascii_4i", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-6261", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/21/4", }, { name: "openSUSE-SU-2016:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html", }, { name: "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/07/20/6", }, { name: "92070", refsource: "BID", url: "http://www.securityfocus.com/bid/92070", }, { name: "DSA-3658", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3658", }, { name: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d", refsource: "CONFIRM", url: "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d", }, { name: "[help-libidn] 20160720 Libidn 1.33 released", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html", }, { name: "USN-3068-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3068-1", }, { name: "[help-libidn] 20150709 out of bounds stack read in function idna_to_ascii_4i", refsource: "MLIST", url: "https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-6261", datePublished: "2016-09-07T20:00:00", dateReserved: "2016-07-21T00:00:00", dateUpdated: "2024-08-06T01:22:20.661Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-2328
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 05:10
Severity ?
EPSS score ?
Summary
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | x_refsource_CONFIRM | |
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-1025.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/74924 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
http://www.fortiguard.com/advisory/FG-VD-15-014/ | x_refsource_MISC | |
https://jira.mongodb.org/browse/SERVER-17252 | x_refsource_CONFIRM | |
https://bugs.exim.org/show_bug.cgi?id=1515 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:10:16.260Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "74924", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/74924", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-VD-15-014/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://jira.mongodb.org/browse/SERVER-17252", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1515", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "74924", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/74924", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.fortiguard.com/advisory/FG-VD-15-014/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://jira.mongodb.org/browse/SERVER-17252", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1515", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-2328", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886", }, { name: "RHSA-2016:1025", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1025.html", }, { name: "74924", refsource: "BID", url: "http://www.securityfocus.com/bid/74924", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "http://www.fortiguard.com/advisory/FG-VD-15-014/", refsource: "MISC", url: "http://www.fortiguard.com/advisory/FG-VD-15-014/", }, { name: "https://jira.mongodb.org/browse/SERVER-17252", refsource: "CONFIRM", url: "https://jira.mongodb.org/browse/SERVER-17252", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1515", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1515", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-2328", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-03-18T00:00:00", dateUpdated: "2024-08-06T05:10:16.260Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-8615
Vulnerability from cvelistv5
Published
2018-08-01 06:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:27:41.202Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "94096", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94096", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/CVE-2016-8615.patch", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20161102A.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl", vendor: "The Curl Project", versions: [ { status: "affected", version: "7.51.0", }, ], }, ], datePublic: "2016-11-02T00:00:00", descriptions: [ { lang: "en", value: "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-99", description: "CWE-99", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:08:58", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "94096", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94096", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/CVE-2016-8615.patch", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20161102A.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037192", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-8615", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl", version: { version_data: [ { version_value: "7.51.0", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", }, ], }, impact: { cvss: [ [ { vectorString: "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, ], [ { vectorString: "4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-99", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "94096", refsource: "BID", url: "http://www.securityfocus.com/bid/94096", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615", }, { name: "https://curl.haxx.se/CVE-2016-8615.patch", refsource: "CONFIRM", url: "https://curl.haxx.se/CVE-2016-8615.patch", }, { name: "https://curl.haxx.se/docs/adv_20161102A.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20161102A.html", }, { name: "https://www.tenable.com/security/tns-2016-21", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-21", }, { name: "1037192", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037192", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-8615", datePublished: "2018-08-01T06:00:00", dateReserved: "2016-10-12T00:00:00", dateUpdated: "2024-08-06T02:27:41.202Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8853
Vulnerability from cvelistv5
Published
2016-05-25 15:00
Modified
2024-08-06 08:29
Severity ?
EPSS score ?
Summary
The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:29:22.074Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "[oss-security] 20160420 Re: CVE Request: perl: denial-of-service / Regexp-matching \"hangs\" indefinitely on illegal input using binmode :utf8 using 100%CPU", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/04/20/7", }, { name: "USN-3625-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3625-2/", }, { name: "[oss-security] 20160420 CVE Request: perl: denial-of-service / Regexp-matching \"hangs\" indefinitely on illegal input using binmode :utf8 using 100%CPU", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/04/20/5", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://rt.perl.org/Public/Bug/Display.html?id=123562", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "86707", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/86707", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1329106", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5", }, { name: "USN-3625-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3625-1/", }, { name: "FEDORA-2016-5a9313e4b4", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-07T00:00:00", descriptions: [ { lang: "en", value: "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-01T09:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "[oss-security] 20160420 Re: CVE Request: perl: denial-of-service / Regexp-matching \"hangs\" indefinitely on illegal input using binmode :utf8 using 100%CPU", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/04/20/7", }, { name: "USN-3625-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3625-2/", }, { name: "[oss-security] 20160420 CVE Request: perl: denial-of-service / Regexp-matching \"hangs\" indefinitely on illegal input using binmode :utf8 using 100%CPU", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/04/20/5", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://rt.perl.org/Public/Bug/Display.html?id=123562", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "86707", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/86707", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1329106", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5", }, { name: "USN-3625-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3625-1/", }, { name: "FEDORA-2016-5a9313e4b4", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2015-8853", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201701-75", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-75", }, { name: "[oss-security] 20160420 Re: CVE Request: perl: denial-of-service / Regexp-matching \"hangs\" indefinitely on illegal input using binmode :utf8 using 100%CPU", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/04/20/7", }, { name: "USN-3625-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3625-2/", }, { name: "[oss-security] 20160420 CVE Request: perl: denial-of-service / Regexp-matching \"hangs\" indefinitely on illegal input using binmode :utf8 using 100%CPU", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/04/20/5", }, { name: "https://rt.perl.org/Public/Bug/Display.html?id=123562", refsource: "CONFIRM", url: "https://rt.perl.org/Public/Bug/Display.html?id=123562", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "86707", refsource: "BID", url: "http://www.securityfocus.com/bid/86707", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1329106", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1329106", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { name: "http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5", refsource: "CONFIRM", url: "http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5", }, { name: "USN-3625-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3625-1/", }, { name: "FEDORA-2016-5a9313e4b4", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2015-8853", datePublished: "2016-05-25T15:00:00", dateReserved: "2016-04-20T00:00:00", dateUpdated: "2024-08-06T08:29:22.074Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-6302
Vulnerability from cvelistv5
Published
2016-09-16 00:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:29:18.217Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2018:2185", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2185", }, { name: "RHSA-2018:2186", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2186", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPUE", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "92628", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/92628", }, { tags: [ "x_transferred", ], url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=e97763c92c655dcf4af2860b3abd2bc4c8a267f9", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAPSV", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { name: "1036885", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036885", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-16", }, { tags: [ "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-21", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa132", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "RHSA-2018:2187", tags: [ "vendor-advisory", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2187", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-08-23T00:00:00", descriptions: [ { lang: "en", value: "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://www.tenable.com/security/tns-2016-20", }, { name: "RHSA-2018:2185", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2185", }, { name: "RHSA-2018:2186", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2186", }, { url: "http://www.splunk.com/view/SP-CAAAPUE", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "RHSA-2016:1940", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1940.html", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", }, { name: "92628", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/92628", }, { url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=e97763c92c655dcf4af2860b3abd2bc4c8a267f9", }, { url: "http://www.splunk.com/view/SP-CAAAPSV", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { name: "1036885", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036885", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "https://www.tenable.com/security/tns-2016-16", }, { url: "https://www.tenable.com/security/tns-2016-21", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html", }, { url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa132", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FreeBSD-SA-16:26", tags: [ "vendor-advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc", }, { name: "RHSA-2018:2187", tags: [ "vendor-advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2187", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-6302", datePublished: "2016-09-16T00:00:00", dateReserved: "2016-07-26T00:00:00", dateUpdated: "2024-08-06T01:29:18.217Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8392
Vulnerability from cvelistv5
Published
2015-12-02 01:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor-advisory, x_refsource_REDHAT | |
https://bto.bluecoat.com/security-advisory/sa128 | x_refsource_CONFIRM | |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.675Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-23T00:00:00", descriptions: [ { lang: "en", value: "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8392", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20151128 Re: Heap Overflow in PCRE", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/11/29/1", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "RHSA-2016:2750", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2750.html", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", refsource: "CONFIRM", url: "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8392", datePublished: "2015-12-02T01:00:00", dateReserved: "2015-12-01T00:00:00", dateUpdated: "2024-08-06T08:13:32.675Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-7407
Vulnerability from cvelistv5
Published
2017-04-03 20:00
Modified
2024-08-05 16:04
Severity ?
EPSS score ?
Summary
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
References
â–Ľ | URL | Tags |
---|---|---|
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2018:3558 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201709-14 | vendor-advisory, x_refsource_GENTOO | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:04:11.297Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201709-14", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-04-03T00:00:00", descriptions: [ { lang: "en", value: "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201709-14", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-7407", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13", refsource: "MISC", url: "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "GLSA-201709-14", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201709-14", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-7407", datePublished: "2017-04-03T20:00:00", dateReserved: "2017-04-03T00:00:00", dateUpdated: "2024-08-05T16:04:11.297Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-7167
Vulnerability from cvelistv5
Published
2016-10-07 14:00
Modified
2024-08-06 01:50
Severity ?
EPSS score ?
Summary
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:50:47.483Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2016-80f4f71eff", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/", }, { name: "SSA:2016-259-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "FEDORA-2016-08533fc59c", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/", }, { name: "92975", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92975", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { name: "1036813", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036813", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://curl.haxx.se/docs/adv_20160914.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2017:2016", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2016", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "FEDORA-2016-7a2ed52d41", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-09-14T00:00:00", descriptions: [ { lang: "en", value: "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "FEDORA-2016-80f4f71eff", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/", }, { name: "SSA:2016-259-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632", }, { name: "RHSA-2018:3558", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "FEDORA-2016-08533fc59c", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/", }, { name: "92975", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92975", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { name: "1036813", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036813", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://curl.haxx.se/docs/adv_20160914.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2017:2016", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2016", }, { name: "RHSA-2018:2486", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-47", }, { name: "FEDORA-2016-7a2ed52d41", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-7167", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2016-80f4f71eff", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/", }, { name: "SSA:2016-259-01", refsource: "SLACKWARE", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632", }, { name: "RHSA-2018:3558", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3558", }, { name: "FEDORA-2016-08533fc59c", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/", }, { name: "92975", refsource: "BID", url: "http://www.securityfocus.com/bid/92975", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { name: "1036813", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036813", }, { name: "https://curl.haxx.se/docs/adv_20160914.html", refsource: "CONFIRM", url: "https://curl.haxx.se/docs/adv_20160914.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", }, { name: "RHSA-2017:2016", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2016", }, { name: "RHSA-2018:2486", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2486", }, { name: "GLSA-201701-47", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-47", }, { name: "FEDORA-2016-7a2ed52d41", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-7167", datePublished: "2016-10-07T14:00:00", dateReserved: "2016-09-08T00:00:00", dateUpdated: "2024-08-06T01:50:47.483Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-0787
Vulnerability from cvelistv5
Published
2016-04-13 17:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:30:04.675Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2016-215a2219b1", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10156", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.libssh2.org/CVE-2016-0787.patch", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.libssh2.org/adv_20160223.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://puppet.com/security/cve/CVE-2016-0787", }, { name: "FEDORA-2016-7942ee2cc5", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html", }, { name: "GLSA-201606-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201606-12", }, { name: "openSUSE-SU-2016:0639", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa120", }, { name: "DSA-3487", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3487", }, { name: "82514", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/82514", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-23T00:00:00", descriptions: [ { lang: "en", value: "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-12-08T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "FEDORA-2016-215a2219b1", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10156", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.libssh2.org/CVE-2016-0787.patch", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.libssh2.org/adv_20160223.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://puppet.com/security/cve/CVE-2016-0787", }, { name: "FEDORA-2016-7942ee2cc5", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html", }, { name: "GLSA-201606-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201606-12", }, { name: "openSUSE-SU-2016:0639", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa120", }, { name: "DSA-3487", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3487", }, { name: "82514", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/82514", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-0787", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2016-215a2219b1", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10156", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10156", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { name: "https://www.libssh2.org/CVE-2016-0787.patch", refsource: "CONFIRM", url: "https://www.libssh2.org/CVE-2016-0787.patch", }, { name: "https://www.libssh2.org/adv_20160223.html", refsource: "CONFIRM", url: "https://www.libssh2.org/adv_20160223.html", }, { name: "https://puppet.com/security/cve/CVE-2016-0787", refsource: "CONFIRM", url: "https://puppet.com/security/cve/CVE-2016-0787", }, { name: "FEDORA-2016-7942ee2cc5", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html", }, { name: "GLSA-201606-12", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201606-12", }, { name: "openSUSE-SU-2016:0639", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html", }, { name: "https://bto.bluecoat.com/security-advisory/sa120", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa120", }, { name: "DSA-3487", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3487", }, { name: "82514", refsource: "BID", url: "http://www.securityfocus.com/bid/82514", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-0787", datePublished: "2016-04-13T17:00:00", dateReserved: "2015-12-16T00:00:00", dateUpdated: "2024-08-05T22:30:04.675Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-10684
Vulnerability from cvelistv5
Published
2017-06-29 23:00
Modified
2024-08-05 17:41
Severity ?
EPSS score ?
Summary
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
References
â–Ľ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201804-13 | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.redhat.com/show_bug.cgi?id=1464687 | x_refsource_MISC | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T17:41:55.540Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464687", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-06-29T00:00:00", descriptions: [ { lang: "en", value: "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:06:48", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-201804-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201804-13", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464687", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-10684", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201804-13", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201804-13", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1464687", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1464687", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-10684", datePublished: "2017-06-29T23:00:00", dateReserved: "2017-06-29T00:00:00", dateUpdated: "2024-08-05T17:41:55.540Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-3706
Vulnerability from cvelistv5
Published
2016-06-10 15:00
Modified
2024-08-06 00:03
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
References
â–Ľ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html | vendor-advisory, x_refsource_SUSE | |
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/88440 | vdb-entry, x_refsource_BID | |
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 | x_refsource_CONFIRM | |
https://sourceware.org/bugzilla/show_bug.cgi?id=20010 | x_refsource_CONFIRM | |
https://source.android.com/security/bulletin/2017-12-01 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/102073 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:03:34.443Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9", }, { name: "88440", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/88440", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=20010", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2017-12-01", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "102073", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/102073", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-04-29T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-12-07T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openSUSE-SU-2016:1779", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9", }, { name: "88440", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/88440", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=20010", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2017-12-01", }, { name: "openSUSE-SU-2016:1527", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", }, { name: "102073", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/102073", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-3706", datePublished: "2016-06-10T15:00:00", dateReserved: "2016-03-30T00:00:00", dateUpdated: "2024-08-06T00:03:34.443Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-7824
Vulnerability from cvelistv5
Published
2014-11-18 15:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/11/10/2 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/62603 | third-party-advisory, x_refsource_SECUNIA | |
http://advisories.mageia.org/MGASA-2014-0457.html | x_refsource_CONFIRM | |
https://bugs.freedesktop.org/show_bug.cgi?id=85105 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98576 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/71012 | vdb-entry, x_refsource_BID | |
http://www.ubuntu.com/usn/USN-2425-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2014/dsa-3099 | vendor-advisory, x_refsource_DEBIAN | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 | vendor-advisory, x_refsource_MANDRIVA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:03:27.015Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20141110 CVE-2014-7824: D-Bus denial of service via incomplete fix for CVE-2014-3636", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2014/11/10/2", }, { name: "62603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62603", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0457.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.freedesktop.org/show_bug.cgi?id=85105", }, { name: "dbus-cve20147824-dos(98576)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98576", }, { name: "71012", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71012", }, { name: "USN-2425-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2425-1", }, { name: "DSA-3099", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3099", }, { name: "MDVSA-2015:176", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:176", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-11-10T00:00:00", descriptions: [ { lang: "en", value: "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-07T15:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "[oss-security] 20141110 CVE-2014-7824: D-Bus denial of service via incomplete fix for CVE-2014-3636", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2014/11/10/2", }, { name: "62603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62603", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0457.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.freedesktop.org/show_bug.cgi?id=85105", }, { name: "dbus-cve20147824-dos(98576)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98576", }, { name: "71012", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71012", }, { name: "USN-2425-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2425-1", }, { name: "DSA-3099", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3099", }, { name: "MDVSA-2015:176", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:176", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-7824", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20141110 CVE-2014-7824: D-Bus denial of service via incomplete fix for CVE-2014-3636", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2014/11/10/2", }, { name: "62603", refsource: "SECUNIA", url: "http://secunia.com/advisories/62603", }, { name: "http://advisories.mageia.org/MGASA-2014-0457.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0457.html", }, { name: "https://bugs.freedesktop.org/show_bug.cgi?id=85105", refsource: "CONFIRM", url: "https://bugs.freedesktop.org/show_bug.cgi?id=85105", }, { name: "dbus-cve20147824-dos(98576)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98576", }, { name: "71012", refsource: "BID", url: "http://www.securityfocus.com/bid/71012", }, { name: "USN-2425-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2425-1", }, { name: "DSA-3099", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-3099", }, { name: "MDVSA-2015:176", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:176", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-7824", datePublished: "2014-11-18T15:00:00", dateReserved: "2014-10-03T00:00:00", dateUpdated: "2024-08-06T13:03:27.015Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-9770
Vulnerability from cvelistv5
Published
2016-04-20 16:00
Modified
2024-08-06 13:55
Severity ?
EPSS score ?
Summary
tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.
References
â–Ľ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/04/08/15 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2016/04/08/14 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.suse.com/show_bug.cgi?id=972612 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:55:04.542Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/15", }, { name: "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/14", }, { name: "openSUSE-SU-2016:1414", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html", }, { name: "openSUSE-SU-2016:1101", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=972612", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-11T00:00:00", descriptions: [ { lang: "en", value: "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-06T16:15:49", orgId: "f81092c5-7f14-476d-80dc-24857f90be84", shortName: "microfocus", }, references: [ { name: "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/15", }, { name: "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/04/08/14", }, { name: "openSUSE-SU-2016:1414", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html", }, { name: "openSUSE-SU-2016:1101", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=972612", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@microfocus.com", ID: "CVE-2014-9770", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/04/08/15", }, { name: "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/04/08/14", }, { name: "openSUSE-SU-2016:1414", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html", }, { name: "openSUSE-SU-2016:1101", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html", }, { name: "https://bugzilla.suse.com/show_bug.cgi?id=972612", refsource: "CONFIRM", url: "https://bugzilla.suse.com/show_bug.cgi?id=972612", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f81092c5-7f14-476d-80dc-24857f90be84", assignerShortName: "microfocus", cveId: "CVE-2014-9770", datePublished: "2016-04-20T16:00:00", dateReserved: "2016-04-08T00:00:00", dateUpdated: "2024-08-06T13:55:04.542Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1834
Vulnerability from cvelistv5
Published
2016-05-20 10:00
Modified
2024-08-05 23:10
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:10:39.960Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90691", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=763071", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-16T00:00:00", descriptions: [ { lang: "en", value: "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206567", }, { name: "90691", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90691", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=763071", }, { name: "DSA-3593", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2016/dsa-3593", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2994-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206566", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "product-security@apple.com", ID: "CVE-2016-1834", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704", refsource: "CONFIRM", url: "https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704", }, { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10170", }, { name: "RHSA-2016:1292", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1292", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", }, { name: "https://support.apple.com/HT206567", refsource: "CONFIRM", url: "https://support.apple.com/HT206567", }, { name: "90691", refsource: "BID", url: "http://www.securityfocus.com/bid/90691", }, { name: "https://bugzilla.gnome.org/show_bug.cgi?id=763071", refsource: "CONFIRM", url: "https://bugzilla.gnome.org/show_bug.cgi?id=763071", }, { name: "DSA-3593", refsource: "DEBIAN", url: "https://www.debian.org/security/2016/dsa-3593", }, { name: "http://xmlsoft.org/news.html", refsource: "CONFIRM", url: "http://xmlsoft.org/news.html", }, { name: "APPLE-SA-2016-05-16-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html", }, { name: "USN-2994-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2994-1", }, { name: "https://support.apple.com/HT206566", refsource: "CONFIRM", url: "https://support.apple.com/HT206566", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "APPLE-SA-2016-05-16-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html", }, { name: "https://support.apple.com/HT206564", refsource: "CONFIRM", url: "https://support.apple.com/HT206564", }, { name: "RHSA-2016:2957", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1035890", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1035890", }, { name: "APPLE-SA-2016-05-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html", }, { name: "https://support.apple.com/HT206568", refsource: "CONFIRM", url: "https://support.apple.com/HT206568", }, { name: "APPLE-SA-2016-05-16-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2016-1834", datePublished: "2016-05-20T10:00:00", dateReserved: "2016-01-13T00:00:00", dateUpdated: "2024-08-05T23:10:39.960Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-1283
Vulnerability from cvelistv5
Published
2016-01-03 00:00
Modified
2024-08-05 22:48
Severity ?
EPSS score ?
Summary
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:48:13.788Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.exim.org/show_bug.cgi?id=1767", }, { name: "SSA:2016-172-02", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110", }, { name: "79825", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/79825", }, { name: "FEDORA-2016-f5af8e27ce", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html", }, { name: "FEDORA-2016-65833b5dbc", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.tenable.com/security/tns-2017-14", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "1034555", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034555", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-02T00:00:00", descriptions: [ { lang: "en", value: "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.exim.org/show_bug.cgi?id=1767", }, { name: "SSA:2016-172-02", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110", }, { name: "79825", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/79825", }, { name: "FEDORA-2016-f5af8e27ce", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html", }, { name: "FEDORA-2016-65833b5dbc", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2016-18", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.tenable.com/security/tns-2017-14", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "1034555", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034555", }, { name: "GLSA-201607-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201607-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-1283", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "https://bugs.exim.org/show_bug.cgi?id=1767", refsource: "CONFIRM", url: "https://bugs.exim.org/show_bug.cgi?id=1767", }, { name: "SSA:2016-172-02", refsource: "SLACKWARE", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110", }, { name: "79825", refsource: "BID", url: "http://www.securityfocus.com/bid/79825", }, { name: "FEDORA-2016-f5af8e27ce", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html", }, { name: "FEDORA-2016-65833b5dbc", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://www.tenable.com/security/tns-2016-18", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2016-18", }, { name: "https://www.tenable.com/security/tns-2017-14", refsource: "CONFIRM", url: "https://www.tenable.com/security/tns-2017-14", }, { name: "https://bto.bluecoat.com/security-advisory/sa128", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa128", }, { name: "1034555", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034555", }, { name: "GLSA-201607-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201607-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-1283", datePublished: "2016-01-03T00:00:00", dateReserved: "2016-01-02T00:00:00", dateUpdated: "2024-08-05T22:48:13.788Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2381
Vulnerability from cvelistv5
Published
2016-04-08 15:00
Modified
2024-08-05 23:24
Severity ?
EPSS score ?
Summary
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:24:49.270Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "DSA-3501", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3501", }, { name: "[porters] 20160301 CVE-2016-2381: duplicate environment variables", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.gossamer-threads.com/lists/perl/porters/326387", }, { name: "USN-2916-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2916-1", }, { name: "83802", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/83802", }, { name: "openSUSE-SU-2016:0881", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-03-01T00:00:00", descriptions: [ { lang: "en", value: "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-15T02:22:53", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-201701-75", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-75", }, { name: "DSA-3501", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3501", }, { name: "[porters] 20160301 CVE-2016-2381: duplicate environment variables", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.gossamer-threads.com/lists/perl/porters/326387", }, { name: "USN-2916-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2916-1", }, { name: "83802", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/83802", }, { name: "openSUSE-SU-2016:0881", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-2381", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201701-75", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-75", }, { name: "DSA-3501", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3501", }, { name: "[porters] 20160301 CVE-2016-2381: duplicate environment variables", refsource: "MLIST", url: "http://www.gossamer-threads.com/lists/perl/porters/326387", }, { name: "USN-2916-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2916-1", }, { name: "83802", refsource: "BID", url: "http://www.securityfocus.com/bid/83802", }, { name: "openSUSE-SU-2016:0881", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html", }, { name: "https://www.oracle.com/security-alerts/cpuapr2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", }, { name: "http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076", refsource: "CONFIRM", url: "http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-2381", datePublished: "2016-04-08T15:00:00", dateReserved: "2016-02-13T00:00:00", dateUpdated: "2024-08-05T23:24:49.270Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.