idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
3,414
pgbouncer
7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38
Remove too early set of auth_user When query returns 0 rows (user not found), this user stays as login user... Should fix #69.
1
static void start_auth_request(PgSocket *client, const char *username) { int res; PktBuf *buf; client->auth_user = client->db->auth_user; /* have to fetch user info from db */ client->pool = get_pool(client->db, client->db->auth_user); if (!find_server(client)) { client->wait_for_user_conn = true; retu...
192,440,722,953,440,760,000,000,000,000,000,000,000
client.c
115,609,358,804,220,030,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2015-6817
PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows remote attackers to gain login access as auth_user via an unknown username.
https://nvd.nist.gov/vuln/detail/CVE-2015-6817
3,416
jasper
df5d2867e8004e51e18b89865bc4aa69229227b3
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/df5d2867e8004e51e18b89865bc4aa69229227b3
CVE-2015-5221
1
static int mif_process_cmpt(mif_hdr_t *hdr, char *buf) { jas_tvparser_t *tvp; mif_cmpt_t *cmpt; int id; cmpt = 0; tvp = 0; if (!(cmpt = mif_cmpt_create())) { goto error; } cmpt->tlx = 0; cmpt->tly = 0; cmpt->sampperx = 0; cmpt->samppery = 0; cmpt->width = 0; cmpt->height = 0; cmpt->prec = 0; cmpt->sg...
219,089,908,130,942,330,000,000,000,000,000,000,000
mif_cod.c
316,893,017,337,693,300,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2015-5221
Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5221
3,421
pgbouncer
74d6e5f7de5ec736f71204b7b422af7380c19ac5
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5
Check if auth_user is set. Fixes a crash if password packet appears before startup packet (#42).
1
static bool handle_client_startup(PgSocket *client, PktHdr *pkt) { const char *passwd; const uint8_t *key; bool ok; SBuf *sbuf = &client->sbuf; /* don't tolerate partial packets */ if (incomplete_pkt(pkt)) { disconnect_client(client, true, "client sent partial pkt in startup phase"); return false; } if (...
278,553,822,929,822,730,000,000,000,000,000,000,000
client.c
284,183,957,477,570,960,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
https://nvd.nist.gov/vuln/detail/CVE-2015-4054
3,422
proxychains-ng
9ab7dbeb3baff67a51d0c5e71465c453be0890b5
https://github.com/rofl0r/proxychains-ng
https://github.com/rofl0r/proxychains-ng/commit/9ab7dbeb3baff67a51d0c5e71465c453be0890b5#diff-803c5170888b8642f2a97e5e9423d399
fix for CVE-2015-3887 closes #60
1
static void set_own_dir(const char *argv0) { size_t l = strlen(argv0); while(l && argv0[l - 1] != '/') l--; if(l == 0) memcpy(own_dir, ".", 2); else { memcpy(own_dir, argv0, l - 1); own_dir[l] = 0; } }
100,122,726,235,492,770,000,000,000,000,000,000,000
main.c
334,785,938,086,402,030,000,000,000,000,000,000,000
[ "CWE-426" ]
CVE-2015-3887
Untrusted search path vulnerability in ProxyChains-NG before 4.9 allows local users to gain privileges via a Trojan horse libproxychains4.so library in the current working directory, which is referenced in the LD_PRELOAD path.
https://nvd.nist.gov/vuln/detail/CVE-2015-3887
3,423
abrt
17cb66b13997b0159b4253b3f5722db79f476d68
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68
ccpp: stop reading hs_error.log from /tmp The file might contain anything and there is no way to verify its contents. Related: #1211835 Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
int main(int argc, char** argv) { /* Kernel starts us with all fd's closed. * But it's dangerous: * fprintf(stderr) can dump messages into random fds, etc. * Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null. */ int fd = xopen("/dev/null", O_RDWR); while (fd < 2) fd = xd...
103,063,092,257,824,800,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
3,431
linux
60a2362f769cf549dc466134efe71c8bf9fbaaba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba
regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing After freeing pin from regulator_ena_gpio_free, loop can access the pin. So this patch fixes not to access pin after freeing. Signed-off-by: Seung-Woo Kim <sw0312.kim@samsung.com> Signed-off-by: Mark Brown <broonie@kernel.org>
1
static void regulator_ena_gpio_free(struct regulator_dev *rdev) { struct regulator_enable_gpio *pin, *n; if (!rdev->ena_pin) return; /* Free the GPIO only in case of no use */ list_for_each_entry_safe(pin, n, &regulator_ena_gpio_list, list) { if (pin->gpiod == rdev->ena_pin->gpiod) { if (pin->request_count...
153,964,382,604,737,770,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2014-9940
The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2014-9940
3,432
linux
69c433ed2ecd2d3264efd7afec4439524b319121
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
fs: limit filesystem stacking depth Add a simple read-only counter to super_block that indicates how deep this is in the stack of filesystems. Previously ecryptfs was the only stackable filesystem and it explicitly disallowed multiple layers of itself. Overlayfs, however, can be stacked recursively and also may be s...
1
static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *raw_data) { struct super_block *s; struct ecryptfs_sb_info *sbi; struct ecryptfs_dentry_info *root_info; const char *err = "Getting sb failed"; struct inode *inode; struct path path; uid_t check_ruid;...
206,875,532,923,431,400,000,000,000,000,000,000,000
main.c
105,638,946,343,753,250,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-9922
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-9922
3,433
linux
69c433ed2ecd2d3264efd7afec4439524b319121
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
fs: limit filesystem stacking depth Add a simple read-only counter to super_block that indicates how deep this is in the stack of filesystems. Previously ecryptfs was the only stackable filesystem and it explicitly disallowed multiple layers of itself. Overlayfs, however, can be stacked recursively and also may be s...
1
static int ovl_fill_super(struct super_block *sb, void *data, int silent) { struct path lowerpath; struct path upperpath; struct path workpath; struct inode *root_inode; struct dentry *root_dentry; struct ovl_entry *oe; struct ovl_fs *ufs; struct kstatfs statfs; int err; err = -ENOMEM; ufs = kzalloc(sizeof(...
242,173,763,105,780,330,000,000,000,000,000,000,000
super.c
28,355,160,904,642,360,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-9922
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-9922
3,434
linux
9709674e68646cee5a24e3000b3558d25412203a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9709674e68646cee5a24e3000b3558d25412203a
ipv4: fix a race in ip4_datagram_release_cb() Alexey gave a AddressSanitizer[1] report that finally gave a good hint at where was the origin of various problems already reported by Dormando in the past [2] Problem comes from the fact that UDP can have a lockless TX path, and concurrent threads can manipulate sk_dst_c...
1
void ip4_datagram_release_cb(struct sock *sk) { const struct inet_sock *inet = inet_sk(sk); const struct ip_options_rcu *inet_opt; __be32 daddr = inet->inet_daddr; struct flowi4 fl4; struct rtable *rt; if (! __sk_dst_get(sk) || __sk_dst_check(sk, 0)) return; rcu_read_lock(); inet_opt = rcu_derefere...
311,398,138,099,162,900,000,000,000,000,000,000,000
datagram.c
337,751,027,115,515,430,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2014-9914
Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sock...
https://nvd.nist.gov/vuln/detail/CVE-2014-9914
3,444
rawstudio
9c2cd3c93c05d009a91d84eedbb85873b0cb505d
https://github.com/rawstudio/rawstudio
https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d
Fixes insecure use of temporary file (CVE-2014-4978).
1
rs_filter_graph(RSFilter *filter) { g_return_if_fail(RS_IS_FILTER(filter)); GString *str = g_string_new("digraph G {\n"); rs_filter_graph_helper(str, filter); g_string_append_printf(str, "}\n"); g_file_set_contents("/tmp/rs-filter-graph", str->str, str->len, NULL); if (0 != system("dot -Tpng >/tmp/rs-...
20,000,396,220,013,242,000,000,000,000,000,000,000
rs-filter.c
248,284,536,212,493,870,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2014-4978
The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph.
https://nvd.nist.gov/vuln/detail/CVE-2014-4978
3,449
FFmpeg
5aba5b89d0b1d73164d3b81764828bb8b20ff32a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/5aba5b89d0b1d73164d3b81764828bb8b20ff32a
avcodec/mpeg4videodec: Check for bitstream end in read_quant_matrix_ext() Fixes: out of array read Fixes: asff-crash-0e53d0dc491dfdd507530b66562812fbd4c36678 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static void read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb) { int i, j, v; if (get_bits1(gb)) { /* intra_quantiser_matrix */ for (i = 0; i < 64; i++) { v = get_bits(gb, 8); j = s->idsp.idct_permutation[ff_zigzag_direct[i]]; s->intra_matrix[...
213,473,736,044,128,240,000,000,000,000,000,000,000
mpeg4videodec.c
190,961,130,653,831,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-1999015
FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5a...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999015
3,450
FFmpeg
a7e032a277452366771951e29fd0bf2bd5c029f0
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a7e032a277452366771951e29fd0bf2bd5c029f0
avformat/rmdec: Do not pass mime type in rm_read_multi() to ff_rm_read_mdpr_codecdata() Fixes: use after free() Fixes: rmdec-crash-ffe85b4cab1597d1cfea6955705e53f1f5c8a362 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int rm_read_multi(AVFormatContext *s, AVIOContext *pb, AVStream *st, char *mime) { int number_of_streams = avio_rb16(pb); int number_of_mdpr; int i, ret; unsigned size2; for (i = 0; i<number_of_streams; i++) avio_rb16(pb); number_of_mdpr = avio_rb16(pb); ...
260,453,905,446,702,300,000,000,000,000,000,000,000
rmdec.c
313,294,444,812,730,200,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-1999013
FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999013
3,451
FFmpeg
9807d3976be0e92e4ece3b4b1701be894cd7c2e1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1
avformat/pva: Check for EOF before retrying in read_part_of_packet() Fixes: Infinite loop Fixes: pva-4b1835dbc2027bf3c567005dcc78e85199240d06 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int read_part_of_packet(AVFormatContext *s, int64_t *pts, int *len, int *strid, int read_packet) { AVIOContext *pb = s->pb; PVAContext *pvactx = s->priv_data; int syncword, streamid, reserved, flags, length, pts_flag; int64_t pva_pts = AV_NOPTS_VALUE, startpos; ...
82,750,978,880,669,140,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2018-1999012
FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999012
3,452
FFmpeg
2b46ebdbff1d8dec7a3d8ea280a612b91a582869
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869
avformat/asfdec_o: Check size_bmp more fully Fixes: integer overflow and out of array access Fixes: asfo-crash-46080c4341572a7137a162331af77f6ded45cbd7 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int parse_video_info(AVIOContext *pb, AVStream *st) { uint16_t size_asf; // ASF-specific Format Data size uint32_t size_bmp; // BMP_HEADER-specific Format Data size unsigned int tag; st->codecpar->width = avio_rl32(pb); st->codecpar->height = avio_rl32(pb); avio_skip(pb, 1); // skip res...
51,010,198,014,372,410,000,000,000,000,000,000,000
asfdec_o.c
216,306,402,722,308,640,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-1999011
FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999011
3,453
FFmpeg
cced03dd667a5df6df8fd40d8de0bff477ee02e8
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8
avformat/mms: Add missing chunksize check Fixes: out of array read Fixes: mms-crash-01b6c5d85f9d9f40f4e879896103e9f5b222816a Found-by: Paul Ch <paulcher@icloud.com> 1st hunk by Paul Ch <paulcher@icloud.com> Tested-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
int ff_mms_asf_header_parser(MMSContext *mms) { uint8_t *p = mms->asf_header; uint8_t *end; int flags, stream_id; mms->stream_num = 0; if (mms->asf_header_size < sizeof(ff_asf_guid) * 2 + 22 || memcmp(p, ff_asf_header, sizeof(ff_asf_guid))) { av_log(NULL, AV_LOG_ERROR, ...
10,142,334,619,194,337,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-1999010
FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5d...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999010
3,454
libarchive
9c84b7426660c09c18cc349f6d70b5f8168b5680
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/9c84b7426660c09c18cc349f6d70b5f8168b5680
warc: consume data once read The warc decoder only used read ahead, it wouldn't actually consume data that had previously been printed. This means that if you specify an invalid content length, it will just reprint the same data over and over and over again until it hits the desired length. This means that a WARC res...
1
_warc_read(struct archive_read *a, const void **buf, size_t *bsz, int64_t *off) { struct warc_s *w = a->format->data; const char *rab; ssize_t nrd; if (w->cntoff >= w->cntlen) { eof: /* it's our lucky day, no work, we can leave early */ *buf = NULL; *bsz = 0U; *off = w->cntoff + 4U/*for \r\n\r\n separator...
335,908,245,050,720,980,000,000,000,000,000,000,000
archive_read_support_format_warc.c
311,131,878,398,425,230,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-1000880
libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000880
3,455
libarchive
15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175
Skip 0-length ACL fields Currently, it is possible to create an archive that crashes bsdtar with a malformed ACL: Program received signal SIGSEGV, Segmentation fault. archive_acl_from_text_l (acl=<optimised out>, text=0x7e2e92 "", want_type=<optimised out>, sc=<optimised out>) at libarchive/archive_acl.c:1726 1726 ...
1
archive_acl_from_text_l(struct archive_acl *acl, const char *text, int want_type, struct archive_string_conv *sc) { struct { const char *start; const char *end; } field[6], name; const char *s, *st; int numfields, fields, n, r, sol, ret; int type, types, tag, permset, id; size_t len; char sep; switch ...
2,001,925,255,634,939,000,000,000,000,000,000,000
archive_acl.c
109,360,223,959,071,340,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-1000879
libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000879
3,458
libarchive
021efa522ad729ff0f5806c4ce53e4a6cc1daa31
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/021efa522ad729ff0f5806c4ce53e4a6cc1daa31
Avoid a double-free when a window size of 0 is specified new_size can be 0 with a malicious or corrupted RAR archive. realloc(area, 0) is equivalent to free(area), so the region would be free()d here and the free()d again in the cleanup function. Found with a setup running AFL, afl-rb, and qsym.
1
parse_codes(struct archive_read *a) { int i, j, val, n, r; unsigned char bitlengths[MAX_SYMBOLS], zerocount, ppmd_flags; unsigned int maxorder; struct huffman_code precode; struct rar *rar = (struct rar *)(a->format->data); struct rar_br *br = &(rar->br); free_codes(a); /* Skip to the next byte */ r...
150,545,278,699,006,770,000,000,000,000,000,000,000
archive_read_support_format_rar.c
265,141,872,084,551,300,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-1000877
libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000877
3,460
FreeRDP
baee520e3dd9be6511c45a14c5f5e77784de1471
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/baee520e3dd9be6511c45a14c5f5e77784de1471
Fix for #4866: Added additional length checks
1
static UINT drdynvc_process_capability_request(drdynvcPlugin* drdynvc, int Sp, int cbChId, wStream* s) { UINT status; if (!drdynvc) return CHANNEL_RC_BAD_INIT_HANDLE; WLog_Print(drdynvc->log, WLOG_TRACE, "capability_request Sp=%d cbChId=%d", Sp, cbChId); Stream_Seek(s, 1); /* pad */ Stream_Read_U...
297,380,158,017,412,500,000,000,000,000,000,000,000
drdynvc_main.c
119,867,415,456,564,860,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-1000852
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000852
3,467
minisphere
252c1ca184cb38e1acb917aa0e451c5f08519996
https://github.com/fatcerberus/minisphere
https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996
Fix integer overflow in layer_resize in map_engine.c (#268) * Fix integer overflow in layer_resize in map_engine.c There's a buffer overflow bug in the function layer_resize. It allocates a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`. But it didn't check for integer overflow, so if x_size a...
1
layer_resize(int layer, int x_size, int y_size) { int old_height; int old_width; struct map_tile* tile; int tile_width; int tile_height; struct map_tile* tilemap; struct map_trigger* trigger; struct map_zone* zone; int x, y, i; o...
25,690,879,642,748,460,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2018-1000524
miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000524
3,469
memcached
a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
https://github.com/memcached/memcached
https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
Don't overflow item refcount on get Counts as a miss if the refcount is too high. ASCII multigets are the only time refcounts can be held for so long. doing a dirty read of refcount. is aligned. trying to avoid adding an extra refcount branch for all calls of item_get due to performance. might be able to move it in ...
1
static inline void process_get_command(conn *c, token_t *tokens, size_t ntokens, bool return_cas) { char *key; size_t nkey; int i = 0; item *it; token_t *key_token = &tokens[KEY_TOKEN]; char *suffix; assert(c != NULL); do { while(key_token->length != 0) { key = ke...
185,526,984,390,699,900,000,000,000,000,000,000,000
memcached.c
302,848,843,381,355,740,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-1000127
memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000127
3,476
libxsmm
151481489192e6d1997f8bde52c5c425ea41741d
https://github.com/hfp/libxsmm
https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d
Issue #287: made CSR/CSC readers more robust against invalid input (case #1).
1
void libxsmm_sparse_csc_reader( libxsmm_generated_code* io_generated_code, const char* i_csc_file_in, unsigned int** o_row_idx, unsigned int** o_column_idx, doubl...
58,824,011,372,759,270,000,000,000,000,000,000,000
generator_spgemm_csc_reader.c
118,932,308,961,341,520,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20542
There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c (function libxsmm_sparse_csc_reader) in LIBXSMM 1.10, a different vulnerability than CVE-2018-20541 (which is in a different part of the source code and is seen at a different address).
https://nvd.nist.gov/vuln/detail/CVE-2018-20542
3,478
linux
9824dfae5741275473a23a7ed5756c7b6efacc9d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d
net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT Fields ->dev and ->next of struct ipddp_route may be copied to userspace on the SIOCFINDIPDDPRT ioctl. This is only accessible to CAP_NET_ADMIN though. Let's manually copy the relevant fields instead of using memcpy(). BugLink: http://blog.infosect...
1
static int ipddp_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) { struct ipddp_route __user *rt = ifr->ifr_data; struct ipddp_route rcp, rcp2, *rp; if(!capable(CAP_NET_ADMIN)) return -EPERM; if(copy_from_user(&rcp, rt, sizeof(rcp))) return -EFAULT; switch...
248,089,498,899,169,800,000,000,000,000,000,000,000
ipddp.c
149,960,990,739,195,910,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20511
An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2018-20511
3,479
ImageMagick
db0add932fb850d762b02604ca3053b7d7ab6deb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb
Prevent infinite loop
1
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; Quantum index; register Quantum *q; register ssize_t i,...
272,939,187,823,507,500,000,000,000,000,000,000,000
bmp.c
314,845,857,041,993,600,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20467
In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20467
3,480
radare2
4e98402f09a0ef0bb8559a33a4c1988c54938eaf
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/4e98402f09a0ef0bb8559a33a4c1988c54938eaf
None
1
struct r_bin_dyldcache_lib_t *r_bin_dyldcache_extract(struct r_bin_dyldcache_obj_t* bin, int idx, int *nlib) { ut64 liboff, linkedit_offset; ut64 dyld_vmbase; ut32 addend = 0; struct r_bin_dyldcache_lib_t *ret = NULL; struct dyld_cache_image_info* image_infos = NULL; struct mach_header *mh; ut8 *data, *cmdptr;...
77,793,453,937,260,060,000,000,000,000,000,000,000
dyldcache.c
307,373,198,687,004,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-20458
In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting an input file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20458
3,486
mosquitto
9097577b49b7fdcf45d30975976dd93808ccc0c4
https://github.com/eclipse/mosquitto
https://github.com/eclipse/mosquitto/commit/9097577b49b7fdcf45d30975976dd93808ccc0c4
Fix acl_file being ignore for default listener if with per_listener_settings Close #1073. Thanks to Jef Driesen. Bug: https://github.com/eclipse/mosquitto/issues/1073
1
int config__parse_args(struct mosquitto_db *db, struct mosquitto__config *config, int argc, char *argv[]) { int i; int port_tmp; for(i=1; i<argc; i++){ if(!strcmp(argv[i], "-c") || !strcmp(argv[i], "--config-file")){ if(i<argc-1){ db->config_file = argv[i+1]; if(config__read(db, config, false)){ ...
173,901,566,023,283,400,000,000,000,000,000,000,000
conf.c
218,142,261,545,231,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20145
Eclipse Mosquitto 1.5.x before 1.5.5 allows ACL bypass: if the option per_listener_settings was set to true, and the default listener was in use, and the default listener specified an acl_file, then the acl file was being ignored.
https://nvd.nist.gov/vuln/detail/CVE-2018-20145
3,492
linux
f43f39958beb206b53292801e216d9b8a660f087
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087
crypto: user - fix leaking uninitialized memory to userspace All bytes of the NETLINK_CRYPTO report structures must be initialized, since they are copied to userspace. The change from strncpy() to strlcpy() broke this. As a minimal fix, change it back. Fixes: 4473710df1f8 ("crypto: user - Prepare for CRYPTO_MAX_ALG...
1
static int crypto_report_one(struct crypto_alg *alg, struct crypto_user_alg *ualg, struct sk_buff *skb) { strlcpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name)); strlcpy(ualg->cru_driver_name, alg->cra_driver_name, sizeof(ualg->cru_driver_name)); strlcpy(ualg->cru_module_name, module_name(alg->...
285,899,801,669,781,700,000,000,000,000,000,000,000
crypto_user_base.c
192,031,452,937,307,500,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-19854
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regressio...
https://nvd.nist.gov/vuln/detail/CVE-2018-19854
3,493
WavPack
bba5389dc598a92bdf2b297c3ea34620b6679b5b
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b
issue #54: fix potential out-of-bounds heap read
1
int WavpackVerifySingleBlock (unsigned char *buffer, int verify_checksum) { WavpackHeader *wphdr = (WavpackHeader *) buffer; uint32_t checksum_passed = 0, bcount, meta_bc; unsigned char *dp, meta_id, c1, c2; if (strncmp (wphdr->ckID, "wvpk", 4) || wphdr->ckSize + 8 < sizeof (WavpackHeader)) ret...
272,130,961,827,911,630,000,000,000,000,000,000,000
open_utils.c
309,449,084,172,843,070,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19841
The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
https://nvd.nist.gov/vuln/detail/CVE-2018-19841
3,494
linux
5f8cf712582617d523120df67d392059eaf2fc4b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c If a USB sound card reports 0 interfaces, an error condition is triggered and the function usb_audio_probe errors out. In the error path, there was a use-after-free vulnerability where the memory object of the card was first freed, followed by...
1
static int usb_audio_probe(struct usb_interface *intf, const struct usb_device_id *usb_id) { struct usb_device *dev = interface_to_usbdev(intf); const struct snd_usb_audio_quirk *quirk = (const struct snd_usb_audio_quirk *)usb_id->driver_info; struct snd_usb_audio *chip; int i, err; struct usb_host_interfa...
14,561,827,276,978,056,000,000,000,000,000,000,000
card.c
15,688,473,712,363,913,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-19824
In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-19824
3,495
sleuthkit
bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d
https://github.com/sleuthkit/sleuthkit
https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d
Merge pull request #1374 from JordyZomer/develop Fix CVE-2018-19497.
1
hfs_cat_traverse(HFS_INFO * hfs, TSK_HFS_BTREE_CB a_cb, void *ptr) { TSK_FS_INFO *fs = &(hfs->fs_info); uint32_t cur_node; /* node id of the current node */ char *node; uint16_t nodesize; uint8_t is_done = 0; tsk_error_reset(); nodesize = tsk_getu16(fs->endian, hfs->catalog_h...
217,046,689,785,223,500,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-19497
In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
https://nvd.nist.gov/vuln/detail/CVE-2018-19497
3,496
uriparser
f76275d4a91b28d687250525d3a0c5509bbd666f
https://github.com/uriparser/uriparser
https://github.com/uriparser/uriparser/commit/f76275d4a91b28d687250525d3a0c5509bbd666f
UriQuery.c: Catch integer overflow in ComposeQuery and ...Ex
1
int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest, const URI_TYPE(QueryList) * queryList, int maxChars, int * charsWritten, int * charsRequired, UriBool spaceToPlus, UriBool normalizeBreaks) { UriBool firstItem = URI_TRUE; int ampersandLen = 0; /* increased to 1 from second item on */ URI_CHAR * write = dest; ...
35,761,845,554,934,990,000,000,000,000,000,000,000
UriQuery.c
250,998,275,312,918,000,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-19199
An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an integer overflow via a uriComposeQuery* or uriComposeQueryEx* function because of an unchecked multiplication.
https://nvd.nist.gov/vuln/detail/CVE-2018-19199
3,497
uriparser
864f5d4c127def386dd5cc926ad96934b297f04e
https://github.com/uriparser/uriparser
https://github.com/uriparser/uriparser/commit/864f5d4c127def386dd5cc926ad96934b297f04e
UriQuery.c: Fix out-of-bounds-write in ComposeQuery and ...Ex Reported by Google Autofuzz team
1
int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest, const URI_TYPE(QueryList) * queryList, int maxChars, int * charsWritten, int * charsRequired, UriBool spaceToPlus, UriBool normalizeBreaks) { UriBool firstItem = URI_TRUE; int ampersandLen = 0; /* increased to 1 from second item on */ URI_CHAR * write = dest; ...
110,870,270,092,081,400,000,000,000,000,000,000,000
UriQuery.c
228,924,076,332,498,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-19198
An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or uriComposeQueryEx* function because the '&' character is mishandled in certain contexts.
https://nvd.nist.gov/vuln/detail/CVE-2018-19198
3,499
keepalived
f28015671a4b04785859d1b4b1327b367b6a10e9
https://github.com/acassen/keepalived
https://github.com/acassen/keepalived/commit/f28015671a4b04785859d1b4b1327b367b6a10e9
Fix buffer overflow in extract_status_code() Issue #960 identified that the buffer allocated for copying the HTTP status code could overflow if the http response was corrupted. This commit changes the way the status code is read, avoids copying data, and also ensures that the status code is three digits long, is non-...
1
int extract_status_code(char *buffer, size_t size) { char *buf_code; char *begin; char *end = buffer + size; size_t inc = 0; int code; /* Allocate the room */ buf_code = (char *)MALLOC(10); /* Status-Code extraction */ while (buffer < end && *buffer++ != ' ') ; begin = buffer; while (buffer < end && *b...
63,080,800,693,476,370,000,000,000,000,000,000,000
html.c
230,836,095,768,403,100,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-19115
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
https://nvd.nist.gov/vuln/detail/CVE-2018-19115
3,500
lighttpd1.4
2105dae0f9d7a964375ce681e53cb165375f84c1
https://github.com/lighttpd/lighttpd1.4
https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1
[mod_alias] security: potential path traversal with specific configs Security: potential path traversal of a single directory above the alias target with a specific mod_alias config where the alias which is matched does not end in '/', but alias target filesystem path does end in '/'. e.g. server.docroot = "/srv/www/...
1
PHYSICALPATH_FUNC(mod_alias_physical_handler) { plugin_data *p = p_d; int uri_len, basedir_len; char *uri_ptr; size_t k; if (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON; mod_alias_patch_connection(srv, con, p); /* not to include the tailing slash */ basedir_len = buffer_string_length(con->physi...
56,562,215,835,898,430,000,000,000,000,000,000,000
mod_alias.c
99,393,277,811,407,030,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-19052
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does hav...
https://nvd.nist.gov/vuln/detail/CVE-2018-19052
3,518
linux
d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
userns: also map extents in the reverse map to kernel IDs The current logic first clones the extent array and sorts both copies, then maps the lower IDs of the forward mapping into the lower namespace, but doesn't map the lower IDs of the reverse mapping. This means that code in a nested user namespace with >5 extent...
1
static ssize_t map_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos, int cap_setid, struct uid_gid_map *map, struct uid_gid_map *parent_map) { struct seq_file *seq = file->private_data; struct user_namespace *ns = seq->private; struct uid_gid_map new_map; unsigned idx; st...
254,509,644,118,020,100,000,000,000,000,000,000,000
user_namespace.c
68,584,570,552,716,830,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-18955
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the name...
https://nvd.nist.gov/vuln/detail/CVE-2018-18955
3,519
linux
e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
cdrom: fix improper type cast, which can leat to information leak. There is another cast from unsigned long to int which causes a bounds check to fail with specially crafted input. The value is then used as an index in the slot array in cdrom_slot_status(). This issue is similar to CVE-2018-16658 and CVE-2018-10940. ...
1
static int cdrom_ioctl_select_disc(struct cdrom_device_info *cdi, unsigned long arg) { cd_dbg(CD_DO_IOCTL, "entering CDROM_SELECT_DISC\n"); if (!CDROM_CAN(CDC_SELECT_DISC)) return -ENOSYS; if (arg != CDSL_CURRENT && arg != CDSL_NONE) { if ((int)arg >= cdi->capacity) return -EINVAL; } /* * ->sel...
224,235,905,693,533,500,000,000,000,000,000,000,000
cdrom.c
303,156,356,238,150,500,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-18710
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
https://nvd.nist.gov/vuln/detail/CVE-2018-18710
3,520
linux
7b38460dc8e4eafba06c78f8e37099d3b34d473c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7b38460dc8e4eafba06c78f8e37099d3b34d473c
xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE Kanda Motohiro reported that expanding a tiny xattr into a large xattr fails on XFS because we remove the tiny xattr from a shortform fork and then try to re-add it after converting the fork to extents format having not removed the ATTR_RE...
1
xfs_attr_shortform_addname(xfs_da_args_t *args) { int newsize, forkoff, retval; trace_xfs_attr_sf_addname(args); retval = xfs_attr_shortform_lookup(args); if ((args->flags & ATTR_REPLACE) && (retval == -ENOATTR)) { return retval; } else if (retval == -EEXIST) { if (args->flags & ATTR_CREATE) return retv...
35,925,866,201,613,620,000,000,000,000,000,000,000
xfs_attr.c
51,495,444,875,997,870,000,000,000,000,000,000,000
[ "CWE-754" ]
CVE-2018-18690
In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE ...
https://nvd.nist.gov/vuln/detail/CVE-2018-18690
3,523
libmspack
8759da8db6ec9e866cb8eb143313f397f925bb4f
https://github.com/kyz/libmspack
https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f
Avoid returning CHM file entries that are "blank" because they have embedded null bytes
1
static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh, struct mschmd_header *chm, int entire) { unsigned int section, name_len, x, errors, num_chunks; unsigned char buf[0x54], *chunk = NULL, *name, *p, *end; struct mschmd_file *fi, *link = NULL; off_t offset, length; int num_e...
286,877,828,864,113,330,000,000,000,000,000,000,000
chmd.c
86,023,333,538,823,280,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-18585
chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name).
https://nvd.nist.gov/vuln/detail/CVE-2018-18585
3,524
linux
b799207e1e1816b09e7a5920fbb2d5fcf6edd681
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b799207e1e1816b09e7a5920fbb2d5fcf6edd681
bpf: 32-bit RSH verification must truncate input before the ALU op When I wrote commit 468f6eafa6c4 ("bpf: fix 32-bit ALU op verification"), I assumed that, in order to emulate 64-bit arithmetic with 32-bit logic, it is sufficient to just truncate the output to 32 bits; and so I just moved the register size coercion t...
1
static int adjust_scalar_min_max_vals(struct bpf_verifier_env *env, struct bpf_insn *insn, struct bpf_reg_state *dst_reg, struct bpf_reg_state src_reg) { struct bpf_reg_state *regs = cur_regs(env); u8 opcode = BPF_OP(insn->code); bool src_known, dst_known; s64 smin_val, smax_val; u64...
160,529,925,453,980,600,000,000,000,000,000,000,000
verifier.c
16,895,124,142,472,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
https://nvd.nist.gov/vuln/detail/CVE-2018-18445
3,532
gnulib
278b4175c9d7dd47c1a3071554aac02add3b3c35
https://github.com/coreutils/gnulib
https://github.com/coreutils/gnulib/commit/278b4175c9d7dd47c1a3071554aac02add3b3c35
vasnprintf: Fix heap memory overrun bug. Reported by Ben Pfaff <blp@cs.stanford.edu> in <https://lists.gnu.org/archive/html/bug-gnulib/2018-09/msg00107.html>. * lib/vasnprintf.c (convert_to_decimal): Allocate one more byte of memory. * tests/test-vasnprintf.c (test_function): Add another test.
1
convert_to_decimal (mpn_t a, size_t extra_zeroes) { mp_limb_t *a_ptr = a.limbs; size_t a_len = a.nlimbs; /* 0.03345 is slightly larger than log(2)/(9*log(10)). */ size_t c_len = 9 * ((size_t)(a_len * (GMP_LIMB_BITS * 0.03345f)) + 1); char *c_ptr = (char *) malloc (xsum (c_len, extra_zeroes)); if (c_ptr...
267,101,733,010,542,500,000,000,000,000,000,000,000
vasnprintf.c
310,190,725,670,108,440,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-17942
The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.
https://nvd.nist.gov/vuln/detail/CVE-2018-17942
3,536
git
a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
https://github.com/git/git
https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
fsck: detect submodule urls starting with dash Urls with leading dashes can cause mischief on older versions of Git. We should detect them so that they can be rejected by receive.fsckObjects, preventing modern versions of git from being a vector by which attacks can spread. Signed-off-by: Jeff King <peff@peff.net> Si...
1
static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata) { struct fsck_gitmodules_data *data = vdata; const char *subsection, *key; int subsection_len; char *name; if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 || !subsection) return 0; name = xmemdup...
101,845,170,772,504,270,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-17456
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
https://nvd.nist.gov/vuln/detail/CVE-2018-17456
3,537
texlive-source
6ed0077520e2b0da1fd060c7f88db7b2e6068e4c
https://github.com/TeX-Live/texlive-source
https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c
writet1 protection against buffer overflow git-svn-id: svn://tug.org/texlive/trunk/Build/source@48697 c570f23f-e606-0410-a88d-b1316a301751
1
static void t1_check_unusual_charstring(void) { char *p = strstr(t1_line_array, charstringname) + strlen(charstringname); int i; /* if no number follows "/CharStrings", let's read the next line */ if (sscanf(p, "%i", &i) != 1) { /* pdftex_warn("no number found after `%s', I assume it's on the ne...
111,289,472,377,531,110,000,000,000,000,000,000,000
writet1.c
296,322,236,862,841,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-17407
An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
https://nvd.nist.gov/vuln/detail/CVE-2018-17407
3,538
texlive-source
6ed0077520e2b0da1fd060c7f88db7b2e6068e4c
https://github.com/TeX-Live/texlive-source
https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c
writet1 protection against buffer overflow git-svn-id: svn://tug.org/texlive/trunk/Build/source@48697 c570f23f-e606-0410-a88d-b1316a301751
1
static void t1_check_unusual_charstring(void) { char *p = strstr(t1_line_array, charstringname) + strlen(charstringname); int i; /*tex If no number follows |/CharStrings|, let's read the next line. */ if (sscanf(p, "%i", &i) != 1) { strcpy(t1_buf_array, t1_line_array); t1_getline(); ...
186,302,796,745,694,270,000,000,000,000,000,000,000
writet1.c
34,977,694,572,360,150,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-17407
An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
https://nvd.nist.gov/vuln/detail/CVE-2018-17407
3,539
ovs
9237a63c47bd314b807cda0bd2216264e82edbe8
https://github.com/openvswitch/ovs
https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8
ofp-actions: Avoid buffer overread in BUNDLE action decoding. Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9052 Signed-off-by: Ben Pfaff <blp@ovn.org> Acked-by: Justin Pettit <jpettit@ovn.org>
1
decode_bundle(bool load, const struct nx_action_bundle *nab, const struct vl_mff_map *vl_mff_map, uint64_t *tlv_bitmap, struct ofpbuf *ofpacts) { static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5); struct ofpact_bundle *bundle; uint32_t slave_type; size_t slaves_si...
246,918,809,104,071,950,000,000,000,000,000,000,000
ofp-actions.c
262,989,974,079,934,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-17206
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
https://nvd.nist.gov/vuln/detail/CVE-2018-17206
3,540
ovs
0befd1f3745055c32940f5faf9559be6a14395e6
https://github.com/openvswitch/ovs
https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6
ofproto: Fix OVS crash when reverting old flows in bundle commit During bundle commit flows which are added in bundle are applied to ofproto in-order. In case if a flow cannot be added (e.g. flow action is go-to group id which does not exist), OVS tries to revert back all previous flows which were successfully applied...
1
OVS_REQUIRES(ofproto_mutex) { const struct rule_actions *actions = rule_get_actions(rule); /* A rule may not be reinserted. */ ovs_assert(rule->state == RULE_INITIALIZED); if (rule->hard_timeout || rule->idle_timeout) { ovs_list_insert(&ofproto->expirable, &rule->expirable); } ...
230,678,121,195,317,530,000,000,000,000,000,000,000
ofproto.c
288,950,316,551,410,930,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-17205
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to r...
https://nvd.nist.gov/vuln/detail/CVE-2018-17205
3,541
ovs
4af6da3b275b764b1afe194df6499b33d2bf4cde
https://github.com/openvswitch/ovs
https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde
ofp-group: Don't assert-fail decoding bad OF1.5 group mod type or command. When decoding a group mod, the current code validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This caused an...
1
parse_group_prop_ntr_selection_method(struct ofpbuf *payload, enum ofp11_group_type group_type, enum ofp15_group_mod_command group_cmd, struct ofputil_group_props *gp) { struct ntr_group_prop_selection_...
160,132,015,962,314,390,000,000,000,000,000,000,000
ofp-util.c
208,088,101,152,268,600,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-17204
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when...
https://nvd.nist.gov/vuln/detail/CVE-2018-17204
3,543
linux
7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
mm: get rid of vmacache_flush_all() entirely Jann Horn points out that the vmacache_flush_all() function is not only potentially expensive, it's buggy too. It also happens to be entirely unnecessary, because the sequence number overflow case can be avoided by simply making the sequence number be 64-bit. That doesn't...
1
void vmacache_flush_all(struct mm_struct *mm) { struct task_struct *g, *p; count_vm_vmacache_event(VMACACHE_FULL_FLUSHES); /* * Single threaded tasks need not iterate the entire * list of process. We can avoid the flushing as well * since the mm's seqnum was increased and don't have * to worry about other th...
232,034,716,255,818,700,000,000,000,000,000,000,000
vmacache.c
287,040,567,472,576,300,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-17182
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
https://nvd.nist.gov/vuln/detail/CVE-2018-17182
3,544
php-src
23b057742e3cf199612fa8050ae86cae675e214e
https://github.com/php/php-src
https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
Fix for bug #76582 The brigade seems to end up in a messed up state if something fails in shutdown, so we clean it up.
1
static int php_handler(request_rec *r) { php_struct * volatile ctx; void *conf; apr_bucket_brigade * volatile brigade; apr_bucket *bucket; apr_status_t rv; request_rec * volatile parent_req = NULL; TSRMLS_FETCH(); #define PHPAP_INI_OFF php_apache_ini_dtor(r, parent_req TSRMLS_CC); conf = ap_get_module_config(...
182,394,297,957,195,980,000,000,000,000,000,000,000
sapi_apache2.c
187,699,522,903,415,300,000,000,000,000,000,000,000
[ "CWE-79" ]
CVE-2018-17082
The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-17082
3,545
curl
d530e92f59ae9bb2d47066c3c460b25d2ffeb211
https://github.com/curl/curl
https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211
voutf: fix bad arethmetic when outputting warnings to stderr CVE-2018-16842 Reported-by: Brian Carpenter Bug: https://curl.haxx.se/docs/CVE-2018-16842.html
1
static void voutf(struct GlobalConfig *config, const char *prefix, const char *fmt, va_list ap) { size_t width = (79 - strlen(prefix)); if(!config->mute) { size_t len; char *ptr; char *print_buffer; print_buffer = curlx_mvaprintf(fmt, ap); i...
243,200,030,011,946,100,000,000,000,000,000,000,000
tool_msgs.c
68,505,042,536,067,880,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16842
Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-16842
3,546
curl
81d135d67155c5295b1033679c606165d4e28f3f
https://github.com/curl/curl
https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f
Curl_close: clear data->multi_easy on free to avoid use-after-free Regression from b46cfbc068 (7.59.0) CVE-2018-16840 Reported-by: Brian Carpenter (Geeknik Labs) Bug: https://curl.haxx.se/docs/CVE-2018-16840.html
1
CURLcode Curl_close(struct Curl_easy *data) { struct Curl_multi *m; if(!data) return CURLE_OK; Curl_expire_clear(data); /* shut off timers */ m = data->multi; if(m) /* This handle is still part of a multi handle, take care of this first and detach this handle from there. */ curl_multi_...
146,738,609,343,169,300,000,000,000,000,000,000,000
url.c
21,183,698,655,484,456,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16840
A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write ...
https://nvd.nist.gov/vuln/detail/CVE-2018-16840
3,547
curl
f3a24d7916b9173c69a3e0ee790102993833d6c5
https://github.com/curl/curl
https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5
Curl_auth_create_plain_message: fix too-large-input-check CVE-2018-16839 Reported-by: Harry Sintonen Bug: https://curl.haxx.se/docs/CVE-2018-16839.html
1
CURLcode Curl_auth_create_plain_message(struct Curl_easy *data, const char *userp, const char *passwdp, char **outptr, size_t *outlen) { CURLcode result; char *plainauth; size_t ulen; size_t p...
151,646,974,909,090,780,000,000,000,000,000,000,000
cleartext.c
284,710,761,622,311,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-16839
Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-16839
3,548
mongo-c-driver
0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84
https://github.com/mongodb/mongo-c-driver
https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84
Fix for CVE-2018-16790 -- Verify bounds before binary length read. As reported here: https://jira.mongodb.org/browse/CDRIVER-2819, a heap overread occurs due a failure to correctly verify data bounds. In the original check, len - o returns the data left including the sizeof(l) we just read. Instead, the comparison sh...
1
_bson_iter_next_internal (bson_iter_t *iter, /* INOUT */ uint32_t next_keylen, /* IN */ const char **key, /* OUT */ uint32_t *bson_type, /* OUT */ bool *unsupported) /* OUT */ { const uint8_t *data; ...
247,944,174,862,272,700,000,000,000,000,000,000,000
bson-iter.c
140,668,676,497,403,740,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16790
_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer.
https://nvd.nist.gov/vuln/detail/CVE-2018-16790
3,550
ImageMagick6
1007b98f8795ad4bea6bc5f68a32d83e982fdae4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/1007b98f8795ad4bea6bc5f68a32d83e982fdae4
https://github.com/ImageMagick/ImageMagick/issues/1119
1
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; int unique_filenames; ssize_t y...
54,473,371,976,532,860,000,000,000,000,000,000,000
png.c
229,500,338,170,202,940,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-16749
In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16749
3,551
linux
8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status Like d88b6d04: "cdrom: information leak in cdrom_ioctl_media_changed()" There is another cast from unsigned long to int which causes a bounds check to fail with specially crafted input. The value is then used as an index in the slot array in cdrom_slot_status(...
1
static int cdrom_ioctl_drive_status(struct cdrom_device_info *cdi, unsigned long arg) { cd_dbg(CD_DO_IOCTL, "entering CDROM_DRIVE_STATUS\n"); if (!(cdi->ops->capability & CDC_DRIVE_STATUS)) return -ENOSYS; if (!CDROM_CAN(CDC_SELECT_DISC) || (arg == CDSL_CURRENT || arg == CDSL_NONE)) return cdi->ops->d...
318,716,308,735,320,030,000,000,000,000,000,000,000
cdrom.c
303,156,356,238,150,500,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-16658
An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
https://nvd.nist.gov/vuln/detail/CVE-2018-16658
3,552
ImageMagick
ecb31dbad39ccdc65868d5d2a37f0f0521250832
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ecb31dbad39ccdc65868d5d2a37f0f0521250832
https://github.com/ImageMagick/ImageMagick/issues/1268
1
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; Quantum index; register Quantum *q; register ssize_t i,...
231,882,249,216,637,050,000,000,000,000,000,000,000
bmp.c
74,586,236,604,626,345,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2018-16645
There is an excessive memory allocation issue in the functions ReadBMPImage of coders/bmp.c and ReadDIBImage of coders/dib.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16645
3,553
ImageMagick
afa878a689870c28b6994ecf3bb8dbfb2b76d135
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/afa878a689870c28b6994ecf3bb8dbfb2b76d135
https://github.com/ImageMagick/ImageMagick/issues/1269
1
static Image *ReadPICTImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowPICTException(exception,message) \ { \ if (tile_image != (Image *) NULL) \ tile_image=DestroyImage(tile_image); \ if (read_info != (ImageInfo *) NULL) \ read_info=DestroyImageInfo(read_info); \ ThrowReaderE...
268,226,971,198,431,460,000,000,000,000,000,000,000
pict.c
85,654,100,738,905,160,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16644
There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2018-16644
3,554
ImageMagick
6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadCALSImage(const ImageInfo *image_info, ExceptionInfo *exception) { char filename[MagickPathExtent], header[MagickPathExtent], message[MagickPathExtent]; FILE *file; Image *image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; ...
230,963,622,459,541,900,000,000,000,000,000,000,000
cals.c
249,874,488,600,858,530,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
3,555
ImageMagick
6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (info.scale != (Quantum *) NULL) \ info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagi...
32,603,143,152,590,400,000,000,000,000,000,000,000
dcm.c
23,780,388,635,429,870,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
3,556
ImageMagick
6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadPICTImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowPICTException(exception,message) \ { \ if (tile_image != (Image *) NULL) \ tile_image=DestroyImage(tile_image); \ if (read_info != (ImageInfo *) NULL) \ read_info=DestroyImageInfo(read_info); \ ThrowReaderE...
105,401,273,080,100,600,000,000,000,000,000,000,000
pict.c
225,266,491,896,176,200,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
3,557
ImageMagick
6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { char filename[MagickPathExtent]; FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; reg...
327,038,602,402,263,440,000,000,000,000,000,000,000
pwp.c
138,360,736,349,985,270,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
3,558
ImageMagick
cc4ac341f29fa368da6ef01c207deaf8c61f6a2e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cc4ac341f29fa368da6ef01c207deaf8c61f6a2e
https://github.com/ImageMagick/ImageMagick/issues/1162
1
static void InsertRow(Image *image,ssize_t depth,unsigned char *p,ssize_t y, ExceptionInfo *exception) { size_t bit; ssize_t x; register Quantum *q; Quantum index; index=0; switch (depth) { case 1: /* Convert bitmap scanline. */ { q=QueueAuthenticPixels(image,0,y,image->columns,1,e...
248,821,212,902,523,860,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-16642
The function InsertRow in coders/cut.c in ImageMagick 7.0.7-37 allows remote attackers to cause a denial of service via a crafted image file due to an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2018-16642
3,559
ImageMagick
256825d4eb33dc301496710d15cf5a7ae924088b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/256825d4eb33dc301496710d15cf5a7ae924088b
Fixed possible memory leak reported in #1206
1
static MagickBooleanType TIFFWritePhotoshopLayers(Image* image, const ImageInfo *image_info,EndianType endian,ExceptionInfo *exception) { BlobInfo *blob; CustomStreamInfo *custom_stream; Image *base_image, *next; ImageInfo *clone_info; MagickBooleanType status; PhotoshopProfil...
24,688,139,327,807,033,000,000,000,000,000,000,000
tiff.c
316,057,833,404,137,560,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-16641
ImageMagick 7.0.8-6 has a memory leak vulnerability in the TIFFWritePhotoshopLayers function in coders/tiff.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-16641
3,560
Little-CMS
768f70ca405cd3159d990e962d54456773bb8cf8
https://github.com/mm2/Little-CMS
https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8
Upgrade Visual studio 2017 15.8 - Upgrade to 15.8 - Add check on CGATS memory allocation (thanks to Quang Nguyen for pointing out this)
1
void AllocateDataSet(cmsIT8* it8) { TABLE* t = GetTable(it8); if (t -> Data) return; // Already allocated t-> nSamples = atoi(cmsIT8GetProperty(it8, "NUMBER_OF_FIELDS")); t-> nPatches = atoi(cmsIT8GetProperty(it8, "NUMBER_OF_SETS")); t-> Data = (char**)AllocChunk (it8, ((cmsUInt32Number...
130,867,891,295,494,080,000,000,000,000,000,000,000
cmscgats.c
158,410,423,807,065,500,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-16435
Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
https://nvd.nist.gov/vuln/detail/CVE-2018-16435
3,581
OpenSC
03628449b75a93787eb2359412a3980365dda49b
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
iasecc: fixed unbound recursion
1
iasecc_select_file(struct sc_card *card, const struct sc_path *path, struct sc_file **file_out) { struct sc_context *ctx = card->ctx; struct sc_path lpath; int cache_valid = card->cache.valid, df_from_cache = 0; int rv, ii; LOG_FUNC_CALLED(ctx); memcpy(&lpath, path, sizeof(struct sc_path)); if (file_out) *...
15,095,566,280,526,777,000,000,000,000,000,000,000
card-iasecc.c
119,175,450,858,239,650,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2018-16426
Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs.
https://nvd.nist.gov/vuln/detail/CVE-2018-16426
3,582
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial) { cac_private_data_t * priv = CAC_DATA(card); SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL); if (card->serialnr.len) { *serial = card->serialnr; SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL...
62,749,081,203,659,250,000,000,000,000,000,000,000
card-cac.c
325,767,557,583,895,600,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,583
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
decrypt_response(struct sc_card *card, unsigned char *in, size_t inlen, unsigned char *out, size_t * out_len) { size_t cipher_len; size_t i; unsigned char iv[16] = { 0 }; unsigned char plaintext[4096] = { 0 }; epass2003_exdata *exdata = NULL; if (!card->drv_data) return SC_ERROR_INVALID_ARGUMENTS; exdata = ...
242,799,205,298,628,300,000,000,000,000,000,000,000
card-epass2003.c
97,419,460,844,644,880,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,585
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
static int muscle_list_files(sc_card_t *card, u8 *buf, size_t bufLen) { muscle_private_t* priv = MUSCLE_DATA(card); mscfs_t *fs = priv->fs; int x; int count = 0; mscfs_check_cache(priv->fs); for(x = 0; x < fs->cache.size; x++) { u8* oid= fs->cache.array[x].objectId.id; sc_debug(card->ctx, SC_LOG_DEBUG_N...
276,035,595,384,972,040,000,000,000,000,000,000,000
card-muscle.c
67,473,597,783,102,210,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,586
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
static int tcos_select_file(sc_card_t *card, const sc_path_t *in_path, sc_file_t **file_out) { sc_context_t *ctx; sc_apdu_t apdu; sc_file_t *file=NULL; u8 buf[SC_MAX_APDU_BUFFER_SIZE], pathbuf[SC_MAX_PATH_SIZE], *path = pathbuf; unsigned int i; int r, pathlen; assert(card != NULL && in_path != NUL...
206,419,591,839,581,680,000,000,000,000,000,000,000
card-tcos.c
9,490,541,125,465,637,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,587
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
sc_pkcs15emu_esteid_init (sc_pkcs15_card_t * p15card) { sc_card_t *card = p15card->card; unsigned char buff[128]; int r, i; size_t field_length = 0, modulus_length = 0; sc_path_t tmppath; set_string (&p15card->tokeninfo->label, "ID-kaart"); set_string (&p15card->tokeninfo->manufacturer_id, "AS Sertifitseerimisk...
178,422,683,966,294,870,000,000,000,000,000,000,000
pkcs15-esteid.c
123,910,476,764,601,500,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,588
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
static int gemsafe_get_cert_len(sc_card_t *card) { int r; u8 ibuf[GEMSAFE_MAX_OBJLEN]; u8 *iptr; struct sc_path path; struct sc_file *file; size_t objlen, certlen; unsigned int ind, i=0; sc_format_path(GEMSAFE_PATH, &path); r = sc_select_file(card, &path, &file); if (r != SC_SUCCESS || !file) return SC_ER...
173,755,131,876,834,830,000,000,000,000,000,000,000
pkcs15-gemsafeV1.c
195,161,354,280,101,900,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,589
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
static int sc_pkcs15emu_sc_hsm_init (sc_pkcs15_card_t * p15card) { sc_card_t *card = p15card->card; sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data; sc_file_t *file = NULL; sc_path_t path; u8 filelist[MAX_EXT_APDU_LENGTH]; int filelistlength; int r, i; sc_cvc_t devcert; struct sc_app_inf...
292,005,769,458,856,380,000,000,000,000,000,000,000
pkcs15-sc-hsm.c
66,134,502,400,003,190,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,590
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
int sc_file_set_sec_attr(sc_file_t *file, const u8 *sec_attr, size_t sec_attr_len) { u8 *tmp; if (!sc_file_valid(file)) { return SC_ERROR_INVALID_ARGUMENTS; } if (sec_attr == NULL) { if (file->sec_attr != NULL) free(file->sec_attr); file->sec_attr = NULL; file->sec_attr_len = 0; return 0; ...
200,304,011,778,260,900,000,000,000,000,000,000,000
sc.c
239,432,632,543,135,840,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,592
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
static int read_public_key(RSA *rsa) { int r; sc_path_t path; sc_file_t *file; u8 buf[2048], *p = buf; size_t bufsize, keysize; r = select_app_df(); if (r) return 1; sc_format_path("I1012", &path); r = sc_select_file(card, &path, &file); if (r) { fprintf(stderr, "Unable to select public key file: %s\n",...
161,354,385,550,546,090,000,000,000,000,000,000,000
cryptoflex-tool.c
123,572,892,140,995,400,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,593
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
const char * util_acl_to_str(const sc_acl_entry_t *e) { static char line[80], buf[20]; unsigned int acl; if (e == NULL) return "N/A"; line[0] = 0; while (e != NULL) { acl = e->method; switch (acl) { case SC_AC_UNKNOWN: return "N/A"; case SC_AC_NEVER: return "NEVR"; case SC_AC_NONE: return "N...
104,691,721,202,525,020,000,000,000,000,000,000,000
util.c
143,310,929,442,614,960,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
3,594
linux
f1e255d60ae66a9f672ff9a207ee6cd8e33d2679
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f1e255d60ae66a9f672ff9a207ee6cd8e33d2679
USB: yurex: fix out-of-bounds uaccess in read handler In general, accessing userspace memory beyond the length of the supplied buffer in VFS read/write handlers can lead to both kernel memory corruption (via kernel_read()/kernel_write(), which can e.g. be triggered via sys_splice()) and privilege escalation inside use...
1
static ssize_t yurex_read(struct file *file, char __user *buffer, size_t count, loff_t *ppos) { struct usb_yurex *dev; int retval = 0; int bytes_read = 0; char in_buffer[20]; unsigned long flags; dev = file->private_data; mutex_lock(&dev->io_mutex); if (!dev->interface) { /* already disconnect...
31,187,263,457,320,156,000,000,000,000,000,000,000
yurex.c
153,797,157,770,324,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16276
An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.
https://nvd.nist.gov/vuln/detail/CVE-2018-16276
3,595
axtls-8266
5efe2947ab45e81d84b5f707c51d1c64be52f36c
https://github.com/igrr/axtls-8266
https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c
Apply CVE fixes for X509 parsing Apply patches developed by Sze Yiu which correct a vulnerability in X509 parsing. See CVE-2018-16150 and CVE-2018-16149 for more info.
1
static bigint *sig_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, bigint *modulus, bigint *pub_exp) { int i, size; bigint *decrypted_bi, *dat_bi; bigint *bir = NULL; uint8_t *block = (uint8_t *)malloc(sig_len); /* decrypt */ dat_bi = bi_import(ctx, sig, sig_len); ctx-...
270,479,850,159,638,380,000,000,000,000,000,000,000
x509.c
310,893,347,411,045,500,000,000,000,000,000,000,000
[ "CWE-347" ]
CVE-2018-16253
In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification does not properly verify the ASN.1 metadata. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation through fake X.509 certificates. This is an ...
https://nvd.nist.gov/vuln/detail/CVE-2018-16253
3,597
libxkbcommon
96df3106d49438e442510c59acad306e94f3db4d
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d
xkbcomp: Don't crash on no-op modmask expressions If we have an expression of the form 'l1' in an interp section, we unconditionally try to dereference its args, even if it has none. Signed-off-by: Daniel Stone <daniels@collabora.com>
1
ResolveStateAndPredicate(ExprDef *expr, enum xkb_match_operation *pred_rtrn, xkb_mod_mask_t *mods_rtrn, CompatInfo *info) { if (expr == NULL) { *pred_rtrn = MATCH_ANY_OR_NONE; *mods_rtrn = MOD_REAL_MASK_ALL; return true; } *pred_rtrn = MATCH_EXACTLY; i...
322,677,027,855,373,450,000,000,000,000,000,000,000
compat.c
62,511,665,433,778,810,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-15863
Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression.
https://nvd.nist.gov/vuln/detail/CVE-2018-15863
3,598
libxkbcommon
bb4909d2d8fa6b08155e449986a478101e2b2634
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634
Fail expression lookup on invalid atoms If we fail atom lookup, then we should not claim that we successfully looked up the expression. Signed-off-by: Daniel Stone <daniels@collabora.com>
1
ExprResolveLhs(struct xkb_context *ctx, const ExprDef *expr, const char **elem_rtrn, const char **field_rtrn, ExprDef **index_rtrn) { switch (expr->expr.op) { case EXPR_IDENT: *elem_rtrn = NULL; *field_rtrn = xkb_atom_text(ctx, expr->ident.ident); *index_rtr...
31,784,033,323,607,916,000,000,000,000,000,000,000
expr.c
36,624,667,439,648,246,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-15859
Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2018-15859
3,599
libxkbcommon
badb428e63387140720f22486b3acbd3d738859f
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f
keycodes: don't try to copy zero key aliases Move the aliases copy to within the (num_key_aliases > 0) block. Passing info->aliases into this fuction with invalid aliases will cause log messages but num_key_aliases stays on 0. The key_aliases array is never allocated and remains NULL. We then loop through the aliases...
1
CopyKeyAliasesToKeymap(struct xkb_keymap *keymap, KeyNamesInfo *info) { AliasInfo *alias; unsigned i, num_key_aliases; struct xkb_key_alias *key_aliases; /* * Do some sanity checking on the aliases. We can't do it before * because keys and their aliases may be added out-of-order. */ ...
36,688,546,490,544,030,000,000,000,000,000,000,000
keycodes.c
170,792,000,299,261,260,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-15858
Unchecked NULL pointer usage when handling invalid aliases in CopyKeyAliasesToKeymap in xkbcomp/keycodes.c in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file.
https://nvd.nist.gov/vuln/detail/CVE-2018-15858
3,600
libxkbcommon
c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb
xkbcomp: fix pointer value for FreeStmt Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
1
ExprAppendMultiKeysymList(ExprDef *expr, ExprDef *append) { unsigned nSyms = darray_size(expr->keysym_list.syms); unsigned numEntries = darray_size(append->keysym_list.syms); darray_append(expr->keysym_list.symsMapIndex, nSyms); darray_append(expr->keysym_list.symsNumEntries, numEntries); darray_...
50,655,231,442,243,785,000,000,000,000,000,000,000
ast-build.c
176,330,050,765,854,960,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-15857
An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.
https://nvd.nist.gov/vuln/detail/CVE-2018-15857
3,601
libxkbcommon
842e4351c2c97de6051cab6ce36b4a81e709a0e1
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/842e4351c2c97de6051cab6ce36b4a81e709a0e1
compose: fix infinite loop in parser on some inputs The parser would enter an infinite loop if an unterminated keysym literal occurs at EOF. Found with the afl fuzzer. Signed-off-by: Ran Benita <ran234@gmail.com>
1
lex(struct scanner *s, union lvalue *val) { skip_more_whitespace_and_comments: /* Skip spaces. */ while (is_space(peek(s))) if (next(s) == '\n') return TOK_END_OF_LINE; /* Skip comments. */ if (chr(s, '#')) { skip_to_eol(s); goto skip_more_whitespace_and_comments; ...
100,560,431,963,326,220,000,000,000,000,000,000,000
parser.c
167,577,738,802,424,040,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-15856
An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15856
3,602
libxkbcommon
917636b1d0d70205a13f89062b95e3a0fc31d4ff
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff
xkbcomp: fix crash when parsing an xkb_geometry section xkb_geometry sections are ignored; previously the had done so by returning NULL for the section's XkbFile, however some sections of the code do not expect this. Instead, create an XkbFile for it, it will never be processes and discarded later. Caught with the af...
1
CompileKeymap(XkbFile *file, struct xkb_keymap *keymap, enum merge_mode merge) { bool ok; XkbFile *files[LAST_KEYMAP_FILE_TYPE + 1] = { NULL }; enum xkb_file_type type; struct xkb_context *ctx = keymap->ctx; /* Collect section files and check for duplicates. */ for (file = (XkbFile *) file->def...
188,930,561,233,461,670,000,000,000,000,000,000,000
keymap.c
77,713,275,270,082,730,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-15855
Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2018-15855
3,603
libxkbcommon
1f9d1248c07cda8aaff762429c0dce146de8632a
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a
xkbcomp: fix stack overflow when evaluating boolean negation The expression evaluator would go into an infinite recursion when evaluating something like this as a boolean: `!True`. Instead of recursing to just `True` and negating, it recursed to `!True` itself again. Bug inherited from xkbcomp. Caught with the afl f...
1
ExprResolveBoolean(struct xkb_context *ctx, const ExprDef *expr, bool *set_rtrn) { bool ok = false; const char *ident; switch (expr->expr.op) { case EXPR_VALUE: if (expr->expr.value_type != EXPR_TYPE_BOOLEAN) { log_err(ctx, "Found constant of t...
335,781,184,501,352,730,000,000,000,000,000,000,000
expr.c
229,868,570,928,468,760,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2018-15853
Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.
https://nvd.nist.gov/vuln/detail/CVE-2018-15853
3,604
Openswan
9eaa6c2a823c1d2b58913506a15f9474bf857a3d
https://github.com/xelerance/Openswan
https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d
wo#7449 . verify padding contents for IKEv2 RSA sig check Special thanks to Sze Yiu Chau of Purdue University (schau@purdue.edu) who reported the issue.
1
err_t verify_signed_hash(const struct RSA_public_key *k , u_char *s, unsigned int s_max_octets , u_char **psig , size_t hash_len , const u_char *sig_val, size_t sig_len) { unsigned int padlen; /* actual exponent...
27,311,431,029,886,654,000,000,000,000,000,000,000
signatures.c
134,374,594,679,708,330,000,000,000,000,000,000,000
[ "CWE-347" ]
CVE-2018-15836
In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification ...
https://nvd.nist.gov/vuln/detail/CVE-2018-15836
3,607
linux
fdf82a7856b32d905c39afc85e34364491e46346
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fdf82a7856b32d905c39afc85e34364491e46346
x86/speculation: Protect against userspace-userspace spectreRSB The article "Spectre Returns! Speculation Attacks using the Return Stack Buffer" [1] describes two new (sub-)variants of spectrev2-like attacks, making use solely of the RSB contents even on CPUs that don't fallback to BTB on RSB underflow (Skylake+). ...
1
static void __init spectre_v2_select_mitigation(void) { enum spectre_v2_mitigation_cmd cmd = spectre_v2_parse_cmdline(); enum spectre_v2_mitigation mode = SPECTRE_V2_NONE; /* * If the CPU is not affected and the command line mode is NONE or AUTO * then nothing to do. */ if (!boot_cpu_has_bug(X86_BUG_SPECT...
315,846,410,972,680,360,000,000,000,000,000,000,000
bugs.c
84,576,212,440,621,210,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2018-15572
The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
https://nvd.nist.gov/vuln/detail/CVE-2018-15572
3,608
libgit2
1f9a8510e1d2f20ed7334eeeddb92c4dd8e7c649
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/1f9a8510e1d2f20ed7334eeeddb92c4dd8e7c649
smart_pkt: fix potential OOB-read when processing ng packet OSS-fuzz has reported a potential out-of-bounds read when processing a "ng" smart packet: ==1==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6310000249c0 at pc 0x000000493a92 bp 0x7ffddc882cd0 sp 0x7ffddc882480 READ of size 65529 at 0x631000024...
1
static int ng_pkt(git_pkt **out, const char *line, size_t len) { git_pkt_ng *pkt; const char *ptr; size_t alloclen; pkt = git__malloc(sizeof(*pkt)); GITERR_CHECK_ALLOC(pkt); pkt->ref = NULL; pkt->type = GIT_PKT_NG; line += 3; /* skip "ng " */ if (!(ptr = strchr(line, ' '))) goto out_err; len = ptr ...
104,719,273,059,594,510,000,000,000,000,000,000,000
smart_pkt.c
110,262,442,168,514,210,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-15501
In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS.
https://nvd.nist.gov/vuln/detail/CVE-2018-15501
3,609
src
779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
delay bailout for invalid authenticating user until after the packet containing the request has been fully parsed. Reported by Dariusz Tytko and Michał Sajdak; ok deraadt
1
userauth_hostbased(struct ssh *ssh) { Authctxt *authctxt = ssh->authctxt; struct sshbuf *b; struct sshkey *key = NULL; char *pkalg, *cuser, *chost; u_char *pkblob, *sig; size_t alen, blen, slen; int r, pktype, authenticated = 0; if (!authctxt->valid) { debug2("%s: disabled because of invalid user", __func...
163,718,903,000,687,200,000,000,000,000,000,000,000
auth2-hostbased.c
94,121,909,882,891,920,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-15473
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-15473
3,610
src
779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
delay bailout for invalid authenticating user until after the packet containing the request has been fully parsed. Reported by Dariusz Tytko and Michał Sajdak; ok deraadt
1
userauth_pubkey(struct ssh *ssh) { Authctxt *authctxt = ssh->authctxt; struct passwd *pw = authctxt->pw; struct sshbuf *b; struct sshkey *key = NULL; char *pkalg, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; u_char *pkblob, *sig, have_sig; size_t blen, slen; int r, pktype; int authenticated = 0; st...
267,521,840,593,734,700,000,000,000,000,000,000,000
auth2-pubkey.c
260,497,764,924,877,280,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-15473
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-15473
3,611
php-src
f151e048ed27f6f4eef729f3310d053ab5da71d4
https://github.com/php/php-src
https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
Fixed bug #76459 windows linkinfo lacks openbasedir check
1
PHP_FUNCTION(linkinfo) { char *link; size_t link_len; zend_stat_t sb; int ret; if (zend_parse_parameters(ZEND_NUM_ARGS(), "p", &link, &link_len) == FAILURE) { return; } ret = VCWD_STAT(link, &sb); if (ret == -1) { php_error_docref(NULL, E_WARNING, "%s", strerror(errno)); RETURN_LONG(Z_L(-1)...
81,678,671,678,671,030,000,000,000,000,000,000,000
link_win32.c
7,661,815,426,260,158,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
https://nvd.nist.gov/vuln/detail/CVE-2018-15132
3,612
pango
71aaeaf020340412b8d012fe23a556c0420eda5f
http://github.com/bratsche/pango
https://github.com/GNOME/pango/commit/71aaeaf020340412b8d012fe23a556c0420eda5f
Prevent an assertion with invalid Unicode sequences Invalid Unicode sequences, such as 0x2665 0xfe0e 0xfe0f, can trick the Emoji iter code into returning an empty segment, which then triggers an assertion in the itemizer. Prevent this by ensuring that we make progress. This issue was reported by Jeffrey M.
1
_pango_emoji_iter_next (PangoEmojiIter *iter) { PangoEmojiType current_emoji_type = PANGO_EMOJI_TYPE_INVALID; if (iter->end == iter->text_end) return FALSE; iter->start = iter->end; for (; iter->end < iter->text_end; iter->end = g_utf8_next_char (iter->end)) { gunichar ch = g_utf8_get_char (ite...
267,323,365,278,579,830,000,000,000,000,000,000,000
pango-emoji.c
204,716,741,270,840,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-15120
libpango in Pango 1.40.8 through 1.42.3, as used in hexchat and other products, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted text with invalid Unicode sequences.
https://nvd.nist.gov/vuln/detail/CVE-2018-15120
3,614
libmspack
0b0ef9344255ff5acfac6b7af09198ac9c9756c8
https://github.com/kyz/libmspack
https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8
kwaj_read_headers(): fix handling of non-terminated strings
1
static int kwajd_read_headers(struct mspack_system *sys, struct mspack_file *fh, struct mskwajd_header *hdr) { unsigned char buf[16]; int i; /* read in the header */ if (sys->read(fh, &buf[0], kwajh_SIZEOF) != kwajh_SIZEOF) { return MSPACK_ERR_READ; } /* check for "KWAJ" sig...
276,727,971,155,017,370,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-14681
An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
https://nvd.nist.gov/vuln/detail/CVE-2018-14681
3,620
FFmpeg
fa19fbcf712a6a6cc5a5cfdc3254a97b9bce6582
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/fa19fbcf712a6a6cc5a5cfdc3254a97b9bce6582
avformat/movenc: Write version 2 of audio atom if channels is not known The version 1 needs the channel count and would divide by 0 Fixes: division by 0 Fixes: fpe_movenc.c_1108_1.ogg Fixes: fpe_movenc.c_1108_2.ogg Fixes: fpe_movenc.c_1108_3.wav Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg> Signed-off-by: Michael N...
1
static int mov_write_audio_tag(AVFormatContext *s, AVIOContext *pb, MOVMuxContext *mov, MOVTrack *track) { int64_t pos = avio_tell(pb); int version = 0; uint32_t tag = track->tag; if (track->mode == MODE_MOV) { if (track->timescale > UINT16_MAX) { if (mov_get_lpcm_flags(track->p...
170,281,166,197,927,180,000,000,000,000,000,000,000
movenc.c
225,582,288,725,160,770,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2018-14395
libavformat/movenc.c in FFmpeg 3.2 and 4.0.2 allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted audio file when converting to the MOV audio format.
https://nvd.nist.gov/vuln/detail/CVE-2018-14395
3,621
FFmpeg
3a2d21bc5f97aa0161db3ae731fc2732be6108b8
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/3a2d21bc5f97aa0161db3ae731fc2732be6108b8
avformat/movenc: Check input sample count Fixes: division by 0 Fixes: fpe_movenc.c_199_1.wav Fixes: fpe_movenc.c_199_2.wav Fixes: fpe_movenc.c_199_3.wav Fixes: fpe_movenc.c_199_4.wav Fixes: fpe_movenc.c_199_5.wav Fixes: fpe_movenc.c_199_6.wav Fixes: fpe_movenc.c_199_7.wav Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.s...
1
int ff_mov_write_packet(AVFormatContext *s, AVPacket *pkt) { MOVMuxContext *mov = s->priv_data; AVIOContext *pb = s->pb; MOVTrack *trk = &mov->tracks[pkt->stream_index]; AVCodecParameters *par = trk->par; unsigned int samples_in_chunk = 0; int size = pkt->size, ret = 0; uint8_t *reformatted_...
329,834,679,352,203,600,000,000,000,000,000,000,000
movenc.c
225,582,288,725,160,770,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2018-14394
libavformat/movenc.c in FFmpeg before 4.0.2 allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted Waveform audio file.
https://nvd.nist.gov/vuln/detail/CVE-2018-14394
3,622
neomutt
9bfab35522301794483f8f9ed60820bdec9be59e
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e
sanitise cache paths Co-authored-by: JerikoOne <jeriko.one@gmx.us>
1
static int nntp_hcache_namer(const char *path, char *dest, size_t destlen) { return snprintf(dest, destlen, "%s.hcache", path); }
226,490,900,771,100,700,000,000,000,000,000,000,000
newsrc.c
212,530,194,709,979,250,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-14363
An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.
https://nvd.nist.gov/vuln/detail/CVE-2018-14363
3,626
neomutt
6296f7153f0c9d5e5cd3aaf08f9731e56621bdd3
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/6296f7153f0c9d5e5cd3aaf08f9731e56621bdd3
Set length modifiers for group and desc nntp_add_group parses a line controlled by the connected nntp server. Restrict the maximum lengths read into the stack buffers group, and desc.
1
int nntp_add_group(char *line, void *data) { struct NntpServer *nserv = data; struct NntpData *nntp_data = NULL; char group[LONG_STRING]; char desc[HUGE_STRING] = ""; char mod; anum_t first, last; if (!nserv || !line) return 0; if (sscanf(line, "%s " ANUM " " ANUM " %c %[^\n]", group, &l...
119,568,824,275,084,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-14360
An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.
https://nvd.nist.gov/vuln/detail/CVE-2018-14360
3,633
neomutt
1b0f0d0988e6df4e32e9f4bf8780846ea95d4485
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485
Don't overflow stack buffer in msg_parse_fetch
1
static int msg_parse_fetch(struct ImapHeader *h, char *s) { char tmp[SHORT_STRING]; char *ptmp = NULL; if (!s) return -1; while (*s) { SKIPWS(s); if (mutt_str_strncasecmp("FLAGS", s, 5) == 0) { s = msg_parse_flags(h, s); if (!s) return -1; } else if (mutt_str_str...
8,085,076,253,557,074,000,000,000,000,000,000,000
message.c
194,626,342,975,920,640,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-14350
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.
https://nvd.nist.gov/vuln/detail/CVE-2018-14350
3,637
neomutt
93b8ac558752d09e1c56d4f1bc82631316fa9c82
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/93b8ac558752d09e1c56d4f1bc82631316fa9c82
Ensure UID in fetch_uidl
1
static int fetch_uidl(char *line, void *data) { int i, index; struct Context *ctx = (struct Context *) data; struct PopData *pop_data = (struct PopData *) ctx->data; char *endp = NULL; errno = 0; index = strtol(line, &endp, 10); if (errno) return -1; while (*endp == ' ') endp++; memmove(lin...
91,378,846,021,011,030,000,000,000,000,000,000,000
pop.c
75,915,389,016,422,660,000,000,000,000,000,000,000
[ "CWE-824" ]
CVE-2018-14356
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.
https://nvd.nist.gov/vuln/detail/CVE-2018-14356
3,638
neomutt
95e80bf9ff10f68cb6443f760b85df4117cb15eb
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/95e80bf9ff10f68cb6443f760b85df4117cb15eb
Quote path in imap_subscribe
1
int imap_subscribe(char *path, bool subscribe) { struct ImapData *idata = NULL; char buf[LONG_STRING]; char mbox[LONG_STRING]; char errstr[STRING]; struct Buffer err, token; struct ImapMbox mx; if (!mx_is_imap(path) || imap_parse_path(path, &mx) || !mx.mbox) { mutt_error(_("Bad mailbox name")...
336,804,774,773,163,760,000,000,000,000,000,000,000
imap.c
118,871,774,482,714,800,000,000,000,000,000,000,000
[ "CWE-77" ]
CVE-2018-14354
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.
https://nvd.nist.gov/vuln/detail/CVE-2018-14354
3,639
neomutt
3c49c44be9b459d9c616bcaef6eb5d51298c1741
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/3c49c44be9b459d9c616bcaef6eb5d51298c1741
Ensure litlen isn't larger than our mailbox
1
static void cmd_parse_status(struct ImapData *idata, char *s) { char *value = NULL; struct Buffy *inc = NULL; struct ImapMbox mx; struct ImapStatus *status = NULL; unsigned int olduv, oldun; unsigned int litlen; short new = 0; short new_msg_count = 0; char *mailbox = imap_next_word(s); /* We need ...
255,835,415,023,365,760,000,000,000,000,000,000,000
command.c
171,255,987,523,769,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14351
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.
https://nvd.nist.gov/vuln/detail/CVE-2018-14351
3,640
neomutt
36a29280448097f34ce9c94606195f2ac643fed1
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/36a29280448097f34ce9c94606195f2ac643fed1
Handle NO response without message properly
1
static int cmd_handle_untagged(struct ImapData *idata) { unsigned int count = 0; char *s = imap_next_word(idata->buf); char *pn = imap_next_word(s); if ((idata->state >= IMAP_SELECTED) && isdigit((unsigned char) *s)) { pn = s; s = imap_next_word(s); /* EXISTS and EXPUNGE are always related to th...
183,539,949,140,153,240,000,000,000,000,000,000,000
command.c
212,780,463,296,082,520,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14349
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.
https://nvd.nist.gov/vuln/detail/CVE-2018-14349