idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
160,001
tcpdump
877b66b398518d9501513e0860c9f3a8acc70892
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/877b66b398518d9501513e0860c9f3a8acc70892
CVE-2017-13010/BEEP: Do bounds checking when comparing strings. This fixes a buffer over-read discovered by Brian 'geeknik' Carpenter. Add a test using the capture file supplied by the reporter(s).
0
l_strnstart(const char *tstr1, u_int tl1, const char *str2, u_int l2) l_strnstart(netdissect_options *ndo, const char *tstr1, u_int tl1, const char *str2, u_int l2) { if (!ND_TTEST2(*str2, tl1)) { /* * We don't have tl1 bytes worth of captured data * for the string, so we can't check for this * string....
57,469,393,399,590,880,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13010
The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart().
https://nvd.nist.gov/vuln/detail/CVE-2017-13010
2,577
tcpdump
ca336198e8bebccc18502de27672fdbd6eb34856
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/ca336198e8bebccc18502de27672fdbd6eb34856
CVE-2017-13007/PKTAP: Pass a properly updated struct pcap_pkthdr to the sub-dissector. The sub-dissector expects that the length and captured length will reflect the actual remaining data in the packet, not the raw amount including the PKTAP header; pass an updated header, just as we do for PPI. This fixes a buffer o...
1
pktap_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { uint32_t dlt, hdrlen, rectype; u_int caplen = h->caplen; u_int length = h->len; if_printer printer; const pktap_header_t *hdr; if (caplen < sizeof(pktap_header_t) || length < sizeof(pktap_header_t)) { N...
200,408,431,775,823,500,000,000,000,000,000,000,000
print-pktap.c
242,050,816,181,732,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13007
The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13007
160,002
tcpdump
ca336198e8bebccc18502de27672fdbd6eb34856
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/ca336198e8bebccc18502de27672fdbd6eb34856
CVE-2017-13007/PKTAP: Pass a properly updated struct pcap_pkthdr to the sub-dissector. The sub-dissector expects that the length and captured length will reflect the actual remaining data in the packet, not the raw amount including the PKTAP header; pass an updated header, just as we do for PPI. This fixes a buffer o...
0
pktap_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { uint32_t dlt, hdrlen, rectype; u_int caplen = h->caplen; u_int length = h->len; if_printer printer; const pktap_header_t *hdr; struct pcap_pkthdr nhdr; if (caplen < sizeof(pktap_header_t) || length < size...
262,883,133,461,274,900,000,000,000,000,000,000,000
print-pktap.c
35,341,349,066,887,046,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13007
The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13007
2,591
tcpdump
b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd
CVE-2017-13005/NFS: Add two bounds checks before fetching data This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s).
1
xid_map_enter(netdissect_options *ndo, const struct sunrpc_msg *rp, const u_char *bp) { const struct ip *ip = NULL; const struct ip6_hdr *ip6 = NULL; struct xid_map_entry *xmep; if (!ND_TTEST(rp->rm_call.cb_vers)) return (0); switch (IP_V((const struct ip *)bp)) { case 4: ip = (const struct ip ...
55,998,268,801,158,500,000,000,000,000,000,000,000
print-nfs.c
325,597,668,871,085,650,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13005
The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().
https://nvd.nist.gov/vuln/detail/CVE-2017-13005
160,016
tcpdump
b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd
CVE-2017-13005/NFS: Add two bounds checks before fetching data This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s).
0
xid_map_enter(netdissect_options *ndo, const struct sunrpc_msg *rp, const u_char *bp) { const struct ip *ip = NULL; const struct ip6_hdr *ip6 = NULL; struct xid_map_entry *xmep; if (!ND_TTEST(rp->rm_call.cb_vers)) return (0); switch (IP_V((const struct ip *)bp)) { case 4: ip = (const struct ip ...
128,880,981,466,532,620,000,000,000,000,000,000,000
print-nfs.c
112,298,469,328,596,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13005
The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().
https://nvd.nist.gov/vuln/detail/CVE-2017-13005
2,593
tcpdump
cbddb98484ea8ec1deece351abd56e063d775b38
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38
CVE-2017-13002/AODV: Add some missing bounds checks. In aodv_extension() do a bounds check on the extension header before we look at it. This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s). While we're at it, add the RFC number, and check the v...
1
aodv_extension(netdissect_options *ndo, const struct aodv_ext *ep, u_int length) { const struct aodv_hello *ah; switch (ep->type) { case AODV_EXT_HELLO: ah = (const struct aodv_hello *)(const void *)ep; ND_TCHECK(*ah); if (length < sizeof(struct aodv_hello)) goto trunc; ND_PRINT(...
90,330,714,944,185,620,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13002
The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().
https://nvd.nist.gov/vuln/detail/CVE-2017-13002
160,017
tcpdump
cbddb98484ea8ec1deece351abd56e063d775b38
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38
CVE-2017-13002/AODV: Add some missing bounds checks. In aodv_extension() do a bounds check on the extension header before we look at it. This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s). While we're at it, add the RFC number, and check the v...
0
aodv_extension(netdissect_options *ndo, const struct aodv_ext *ep, u_int length) { const struct aodv_hello *ah; ND_TCHECK(*ep); switch (ep->type) { case AODV_EXT_HELLO: ah = (const struct aodv_hello *)(const void *)ep; ND_TCHECK(*ah); if (length < sizeof(struct aodv_hello)) goto tr...
313,542,016,000,852,540,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13002
The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().
https://nvd.nist.gov/vuln/detail/CVE-2017-13002
2,594
tcpdump
7a923447fd49a069a0fd3b6c3547438ab5ee2123
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/7a923447fd49a069a0fd3b6c3547438ab5ee2123
CVE-2017-13001/NFS: Don't copy more data than is in the file handle. Also, put the buffer on the stack; no reason to make it static. (65 bytes isn't a lot.) This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s).
1
nfs_printfh(netdissect_options *ndo, register const uint32_t *dp, const u_int len) { my_fsid fsid; uint32_t ino; const char *sfsname = NULL; char *spacep; if (ndo->ndo_uflag) { u_int i; char const *sep = ""; ND_PRINT((ndo, " fh[")); for (i=0; i<len; i++) { ND_PRINT((ndo, "%s%x", sep, dp[i]...
339,616,538,929,006,480,000,000,000,000,000,000,000
print-nfs.c
100,575,108,855,301,120,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13001
The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().
https://nvd.nist.gov/vuln/detail/CVE-2017-13001
160,018
tcpdump
7a923447fd49a069a0fd3b6c3547438ab5ee2123
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/7a923447fd49a069a0fd3b6c3547438ab5ee2123
CVE-2017-13001/NFS: Don't copy more data than is in the file handle. Also, put the buffer on the stack; no reason to make it static. (65 bytes isn't a lot.) This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s).
0
nfs_printfh(netdissect_options *ndo, register const uint32_t *dp, const u_int len) { my_fsid fsid; uint32_t ino; const char *sfsname = NULL; char *spacep; if (ndo->ndo_uflag) { u_int i; char const *sep = ""; ND_PRINT((ndo, " fh[")); for (i=0; i<len; i++) { ND_PRINT((ndo, "%s%x", sep, dp[i]...
240,668,251,093,714,700,000,000,000,000,000,000,000
print-nfs.c
325,597,668,871,085,650,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13001
The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().
https://nvd.nist.gov/vuln/detail/CVE-2017-13001
2,595
tcpdump
8512734883227c11568bb35da1d48b9f8466f43f
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f
CVE-2017-13000/IEEE 802.15.4: Fix bug introduced two fixes prior. We've already advanced the pointer past the PAN ID, if present; it now points to the address, so don't add 2 to it. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the captur...
1
ieee802_15_4_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { u_int caplen = h->caplen; u_int hdrlen; uint16_t fc; uint8_t seq; uint16_t panid = 0; if (caplen < 3) { ND_PRINT((ndo, "[|802.15.4]")); return caplen; } hdrlen = 3; fc = EXTRACT_LE_16BITS(...
226,608,746,932,513,560,000,000,000,000,000,000,000
print-802_15_4.c
288,503,972,323,871,480,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13000
The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13000
160,019
tcpdump
8512734883227c11568bb35da1d48b9f8466f43f
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f
CVE-2017-13000/IEEE 802.15.4: Fix bug introduced two fixes prior. We've already advanced the pointer past the PAN ID, if present; it now points to the address, so don't add 2 to it. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the captur...
0
ieee802_15_4_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { u_int caplen = h->caplen; u_int hdrlen; uint16_t fc; uint8_t seq; uint16_t panid = 0; if (caplen < 3) { ND_PRINT((ndo, "[|802.15.4]")); return caplen; } hdrlen = 3; fc = EXTRACT_LE_16BITS(...
257,913,645,005,099,250,000,000,000,000,000,000,000
print-802_15_4.c
273,367,841,817,140,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13000
The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13000
2,598
tcpdump
3a76fd7c95fced2c2f8c8148a9055c3a542eff29
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29
CVE-2017-12995/Check for DNS compression pointers that don't point backwards. This is what BIND 9.11.0-P2 does; it not only detects pointers that loop, as "point backwards" means "point before anything we've processed so far, including what we're processing right now", so the pointer can't point to itself (as that's w...
1
ns_nprint(netdissect_options *ndo, register const u_char *cp, register const u_char *bp) { register u_int i, l; register const u_char *rp = NULL; register int compress = 0; int chars_processed; int elt; int data_size = ndo->ndo_snapend - bp; if ((l = labellen(ndo, cp)) == (u_int)-1) return(NU...
307,707,688,388,100,500,000,000,000,000,000,000,000
print-domain.c
48,636,011,061,912,920,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-12995
The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12995
160,020
tcpdump
3a76fd7c95fced2c2f8c8148a9055c3a542eff29
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29
CVE-2017-12995/Check for DNS compression pointers that don't point backwards. This is what BIND 9.11.0-P2 does; it not only detects pointers that loop, as "point backwards" means "point before anything we've processed so far, including what we're processing right now", so the pointer can't point to itself (as that's w...
0
ns_nprint(netdissect_options *ndo, register const u_char *cp, register const u_char *bp) { register u_int i, l; register const u_char *rp = NULL; register int compress = 0; int elt; u_int offset, max_offset; if ((l = labellen(ndo, cp)) == (u_int)-1) return(NULL); if (!ND_TTEST2(*cp, 1)) r...
262,481,142,418,601,870,000,000,000,000,000,000,000
print-domain.c
180,152,224,979,205,500,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-12995
The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12995
2,599
tcpdump
ffde45acf3348f8353fb4064a1b21683ee6b5ddf
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf
CVE-2017-12994/BGP: Move a test inside a loop. The loop can be executed more than once (that's kinda the whole point of a loop), so the check has to be made each time through the loop, not just once before the loop is executed. Do some additional length checks while we're at it. This fixes a buffer over-read discove...
1
bgp_attr_print(netdissect_options *ndo, u_int atype, const u_char *pptr, u_int len) { int i; uint16_t af; uint8_t safi, snpa, nhlen; union { /* copy buffer for bandwidth values */ float f; uint32_t i; } bw; int advance; u_int tlen; const u_char *tptr; char b...
110,718,534,424,942,980,000,000,000,000,000,000,000
print-bgp.c
81,233,617,923,263,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12994
The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12994
160,021
tcpdump
ffde45acf3348f8353fb4064a1b21683ee6b5ddf
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf
CVE-2017-12994/BGP: Move a test inside a loop. The loop can be executed more than once (that's kinda the whole point of a loop), so the check has to be made each time through the loop, not just once before the loop is executed. Do some additional length checks while we're at it. This fixes a buffer over-read discove...
0
bgp_attr_print(netdissect_options *ndo, u_int atype, const u_char *pptr, u_int len) { int i; uint16_t af; uint8_t safi, snpa, nhlen; union { /* copy buffer for bandwidth values */ float f; uint32_t i; } bw; int advance; u_int tlen; const u_char *tptr; char b...
170,730,597,488,739,560,000,000,000,000,000,000,000
print-bgp.c
252,144,078,047,607,820,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12994
The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12994
2,608
tcpdump
e942fb84fbe3a73a98a00d2a279425872b5fb9d2
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/e942fb84fbe3a73a98a00d2a279425872b5fb9d2
CVE-2017-12992/RIPng: Clean up bounds checking. Do bounds checking as we access items. Scan the list of netinfo6 entries based on the supplied packet length, without taking the captured length into account; let the aforementioned bounds checking handle that. This fixes a buffer over-read discovered by Kamil Frankowi...
1
ripng_print(netdissect_options *ndo, const u_char *dat, unsigned int length) { register const struct rip6 *rp = (const struct rip6 *)dat; register const struct netinfo6 *ni; register u_int amt; register u_int i; int j; int trunc; if (ndo->ndo_snapend < dat) return; amt = ndo->ndo_snapend - dat; i = min(le...
219,968,970,773,034,400,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-12992
The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12992
160,022
tcpdump
e942fb84fbe3a73a98a00d2a279425872b5fb9d2
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/e942fb84fbe3a73a98a00d2a279425872b5fb9d2
CVE-2017-12992/RIPng: Clean up bounds checking. Do bounds checking as we access items. Scan the list of netinfo6 entries based on the supplied packet length, without taking the captured length into account; let the aforementioned bounds checking handle that. This fixes a buffer over-read discovered by Kamil Frankowi...
0
ripng_print(netdissect_options *ndo, const u_char *dat, unsigned int length) { register const struct rip6 *rp = (const struct rip6 *)dat; register const struct netinfo6 *ni; unsigned int length_left; u_int j; ND_TCHECK(rp->rip6_cmd); switch (rp->rip6_cmd) { case RIP6_REQUEST: length_left = length; i...
131,872,674,482,666,930,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-12992
The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12992
2,613
tcpdump
db24063b01cba8e9d4d88b7d8ac70c9000c104e4
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4
CVE-2017-12989/RESP: Make sure resp_get_length() advances the pointer for invalid lengths. Make sure that it always sends *endp before returning and that, for invalid lengths where we don't like a character in the length string, what it sets *endp to is past the character in question, so we don't run the risk of infin...
1
resp_get_length(netdissect_options *ndo, register const u_char *bp, int len, const u_char **endp) { int result; u_char c; int saw_digit; int neg; int too_large; if (len == 0) goto trunc; ND_TCHECK(*bp); too_large = 0; neg = 0; if (*bp == '-') { neg = 1; b...
167,321,145,110,708,070,000,000,000,000,000,000,000
print-resp.c
272,971,736,668,673,780,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-12989
The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().
https://nvd.nist.gov/vuln/detail/CVE-2017-12989
160,023
tcpdump
db24063b01cba8e9d4d88b7d8ac70c9000c104e4
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4
CVE-2017-12989/RESP: Make sure resp_get_length() advances the pointer for invalid lengths. Make sure that it always sends *endp before returning and that, for invalid lengths where we don't like a character in the length string, what it sets *endp to is past the character in question, so we don't run the risk of infin...
0
resp_get_length(netdissect_options *ndo, register const u_char *bp, int len, const u_char **endp) { int result; u_char c; int saw_digit; int neg; int too_large; if (len == 0) goto trunc; ND_TCHECK(*bp); too_large = 0; neg = 0; if (*bp == '-') { neg = 1; b...
174,015,953,829,241,470,000,000,000,000,000,000,000
print-resp.c
216,278,389,575,360,500,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-12989
The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().
https://nvd.nist.gov/vuln/detail/CVE-2017-12989
2,614
tcpdump
8934a7d6307267d301182f19ed162563717e29e3
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/8934a7d6307267d301182f19ed162563717e29e3
CVE-2017-12988/TELNET: Add a missing bounds check. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file supplied by the reporter(s).
1
telnet_parse(netdissect_options *ndo, const u_char *sp, u_int length, int print) { int i, x; u_int c; const u_char *osp, *p; #define FETCH(c, sp, length) \ do { \ if (length < 1) \ goto pktend; \ ND_TCHECK(*sp); \ c = *sp++; \ length--; \ } while (0) osp = sp; FETCH(c, sp, length); if (c != IAC) ...
107,867,064,229,076,670,000,000,000,000,000,000,000
print-telnet.c
184,247,914,215,497,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12988
The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().
https://nvd.nist.gov/vuln/detail/CVE-2017-12988
160,024
tcpdump
8934a7d6307267d301182f19ed162563717e29e3
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/8934a7d6307267d301182f19ed162563717e29e3
CVE-2017-12988/TELNET: Add a missing bounds check. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file supplied by the reporter(s).
0
telnet_parse(netdissect_options *ndo, const u_char *sp, u_int length, int print) { int i, x; u_int c; const u_char *osp, *p; #define FETCH(c, sp, length) \ do { \ if (length < 1) \ goto pktend; \ ND_TCHECK(*sp); \ c = *sp++; \ length--; \ } while (0) osp = sp; FETCH(c, sp, length); if (c != IAC) ...
207,077,938,237,960,200,000,000,000,000,000,000,000
print-telnet.c
16,798,107,899,324,310,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12988
The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().
https://nvd.nist.gov/vuln/detail/CVE-2017-12988
2,615
openjpeg
baf0c1ad4572daa89caa3b12985bdd93530f0dd7
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7
bmp_read_info_header(): reject bmp files with biBitCount == 0 (#983)
1
static OPJ_BOOL bmp_read_info_header(FILE* IN, OPJ_BITMAPINFOHEADER* header) { memset(header, 0, sizeof(*header)); /* INFO HEADER */ /* ------------- */ header->biSize = (OPJ_UINT32)getc(IN); header->biSize |= (OPJ_UINT32)getc(IN) << 8; header->biSize |= (OPJ_UINT32)getc(IN) << 16; header->...
165,457,040,852,911,900,000,000,000,000,000,000,000
convertbmp.c
197,193,176,428,127,820,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-12982
The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_m...
https://nvd.nist.gov/vuln/detail/CVE-2017-12982
160,025
openjpeg
baf0c1ad4572daa89caa3b12985bdd93530f0dd7
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7
bmp_read_info_header(): reject bmp files with biBitCount == 0 (#983)
0
static OPJ_BOOL bmp_read_info_header(FILE* IN, OPJ_BITMAPINFOHEADER* header) { memset(header, 0, sizeof(*header)); /* INFO HEADER */ /* ------------- */ header->biSize = (OPJ_UINT32)getc(IN); header->biSize |= (OPJ_UINT32)getc(IN) << 8; header->biSize |= (OPJ_UINT32)getc(IN) << 16; header->...
147,759,721,558,063,660,000,000,000,000,000,000,000
convertbmp.c
181,722,490,948,692,250,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-12982
The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_m...
https://nvd.nist.gov/vuln/detail/CVE-2017-12982
2,619
tcpdump
de981e6070d168b58ec1bb0713ded77ed4ad87f4
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/de981e6070d168b58ec1bb0713ded77ed4ad87f4
CVE-2017-12901/EIGRP: Do more length checks. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file supplied by the reporter(s).
1
eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) { const struct eigrp_common_header *eigrp_com_header; const struct eigrp_tlv_header *eigrp_tlv_header; const u_char *tptr,*tlv_tptr; u_int tlen,eigrp_tlv_len,eigrp_tlv_type,tlv_tlen, byte_length, bit_length; uint8_...
34,544,532,256,323,543,000,000,000,000,000,000,000
print-eigrp.c
168,041,154,571,529,710,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12901
The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12901
160,029
tcpdump
de981e6070d168b58ec1bb0713ded77ed4ad87f4
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/de981e6070d168b58ec1bb0713ded77ed4ad87f4
CVE-2017-12901/EIGRP: Do more length checks. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file supplied by the reporter(s).
0
eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) { const struct eigrp_common_header *eigrp_com_header; const struct eigrp_tlv_header *eigrp_tlv_header; const u_char *tptr,*tlv_tptr; u_int tlen,eigrp_tlv_len,eigrp_tlv_type,tlv_tlen, byte_length, bit_length; uint8_...
124,842,310,550,949,310,000,000,000,000,000,000,000
print-eigrp.c
34,249,284,094,196,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12901
The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12901
2,629
tcpdump
1dcd10aceabbc03bf571ea32b892c522cbe923de
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/1dcd10aceabbc03bf571ea32b892c522cbe923de
CVE-2017-12897/ISO CLNS: Use ND_TTEST() for the bounds checks in isoclns_print(). This fixes a buffer over-read discovered by Kamil Frankowicz. Don't pass the remaining caplen - that's too hard to get right, and we were getting it wrong in at least one case; just use ND_TTEST(). Add a test using the capture file sup...
1
isoclns_print(netdissect_options *ndo, const uint8_t *p, u_int length, u_int caplen) { if (caplen <= 1) { /* enough bytes on the wire ? */ ND_PRINT((ndo, "|OSI")); return; } if (ndo->ndo_eflag) ND_PRINT((ndo, "OSI NLPID %s (0x%02x): ", tok2str(nlpid_values, "Unknown", *p), *p)); switch (*p...
100,921,063,137,195,820,000,000,000,000,000,000,000
print-isoclns.c
145,104,362,232,404,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12897
The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12897
160,034
tcpdump
1dcd10aceabbc03bf571ea32b892c522cbe923de
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/1dcd10aceabbc03bf571ea32b892c522cbe923de
CVE-2017-12897/ISO CLNS: Use ND_TTEST() for the bounds checks in isoclns_print(). This fixes a buffer over-read discovered by Kamil Frankowicz. Don't pass the remaining caplen - that's too hard to get right, and we were getting it wrong in at least one case; just use ND_TTEST(). Add a test using the capture file sup...
0
isoclns_print(netdissect_options *ndo, isoclns_print(netdissect_options *ndo, const uint8_t *p, u_int length) { if (!ND_TTEST(*p)) { /* enough bytes on the wire ? */ ND_PRINT((ndo, "|OSI")); return; } if (ndo->ndo_eflag) ND_PRINT((ndo, "OSI NLPID %s (0x%02x): ", tok2str(nlpid_values, "Unknown", *p), *p));...
215,164,069,956,367,340,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-12897
The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12897
2,642
tcpdump
730fc35968c5433b9e2a829779057f4f9495dc51
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51
CVE-2017-12894/In lookup_bytestring(), take the length of the byte string into account. Otherwise, if, in our search of the hash table, we come across a byte string that's shorter than the string we're looking for, we'll search past the end of the string in the hash table. This fixes a buffer over-read discovered by ...
1
lookup_bytestring(netdissect_options *ndo, register const u_char *bs, const unsigned int nlen) { struct enamemem *tp; register u_int i, j, k; if (nlen >= 6) { k = (bs[0] << 8) | bs[1]; j = (bs[2] << 8) | bs[3]; i = (bs[4] << 8) | bs[5]; } else if (nlen >= 4) { k = (bs[0] << 8) | bs[1]; j = (bs[...
266,681,780,576,494,960,000,000,000,000,000,000,000
addrtoname.c
317,193,900,967,712,260,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12894
Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().
https://nvd.nist.gov/vuln/detail/CVE-2017-12894
160,041
tcpdump
730fc35968c5433b9e2a829779057f4f9495dc51
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51
CVE-2017-12894/In lookup_bytestring(), take the length of the byte string into account. Otherwise, if, in our search of the hash table, we come across a byte string that's shorter than the string we're looking for, we'll search past the end of the string in the hash table. This fixes a buffer over-read discovered by ...
0
lookup_bytestring(netdissect_options *ndo, register const u_char *bs, const unsigned int nlen) { struct bsnamemem *tp; register u_int i, j, k; if (nlen >= 6) { k = (bs[0] << 8) | bs[1]; j = (bs[2] << 8) | bs[3]; i = (bs[4] << 8) | bs[5]; } else if (nlen >= 4) { k = (bs[0] << 8) | bs[1]; j = (bs...
292,097,246,352,968,700,000,000,000,000,000,000,000
addrtoname.c
291,983,787,774,438,320,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12894
Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().
https://nvd.nist.gov/vuln/detail/CVE-2017-12894
2,644
ImageMagick
04178de2247e353fc095846784b9a10fefdbf890
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/04178de2247e353fc095846784b9a10fefdbf890
https://github.com/ImageMagick/ImageMagick/issues/662
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
8,018,273,083,591,260,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2017-12877
Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12877
160,042
ImageMagick
04178de2247e353fc095846784b9a10fefdbf890
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/04178de2247e353fc095846784b9a10fefdbf890
https://github.com/ImageMagick/ImageMagick/issues/662
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
50,799,352,855,754,550,000,000,000,000,000,000,000
mat.c
115,352,298,327,445,360,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-12877
Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12877
2,646
ImageMagick
3d5ac8c20846871f1eb3068b65f93da7cd33bfd0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3d5ac8c20846871f1eb3068b65f93da7cd33bfd0
None
1
static MagickBooleanType WriteCALSImage(const ImageInfo *image_info, Image *image) { char header[MaxTextExtent]; Image *group4_image; ImageInfo *write_info; MagickBooleanType status; register ssize_t i; size_t density, length, orient_x, orient_y; ssize_t cou...
223,208,806,303,774,400,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12669
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12669
160,044
ImageMagick
3d5ac8c20846871f1eb3068b65f93da7cd33bfd0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3d5ac8c20846871f1eb3068b65f93da7cd33bfd0
None
0
static MagickBooleanType WriteCALSImage(const ImageInfo *image_info, Image *image) { char header[MaxTextExtent]; Image *group4_image; ImageInfo *write_info; MagickBooleanType status; register ssize_t i; size_t density, length, orient_x, orient_y; ssize_t cou...
36,511,171,695,203,762,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12669
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12669
2,648
ImageMagick
560e6e512961008938aa1d1b9aab06347b1c8f9b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/560e6e512961008938aa1d1b9aab06347b1c8f9b
None
1
static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image) { MagickBooleanType status; MagickOffsetType offset, *page_table, scene; MemoryInfo *pixel_info; PCXInfo pcx_info; register const IndexPacket *indexes; register const PixelPacket *p; regi...
185,312,616,346,228,350,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12668
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12668
160,046
ImageMagick
560e6e512961008938aa1d1b9aab06347b1c8f9b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/560e6e512961008938aa1d1b9aab06347b1c8f9b
None
0
static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image) { MagickBooleanType status; MagickOffsetType offset, *page_table, scene; MemoryInfo *pixel_info; PCXInfo pcx_info; register const IndexPacket *indexes; register const PixelPacket *p; regi...
52,895,917,359,230,500,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12668
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12668
2,649
ImageMagick
8985ed08f01d465ee65ab5a106186b3868b6f601
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8985ed08f01d465ee65ab5a106186b3868b6f601
None
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
208,847,878,789,259,360,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12667
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12667
160,047
ImageMagick
8985ed08f01d465ee65ab5a106186b3868b6f601
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8985ed08f01d465ee65ab5a106186b3868b6f601
None
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
139,941,792,982,353,600,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12667
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12667
2,650
ImageMagick
859084b4fd966ac007965c3d85caabccd8aee9b4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/859084b4fd966ac007965c3d85caabccd8aee9b4
None
1
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPICTOp 0x98 #define PictVer...
16,589,949,673,789,804,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12665
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12665
160,048
ImageMagick
859084b4fd966ac007965c3d85caabccd8aee9b4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/859084b4fd966ac007965c3d85caabccd8aee9b4
None
0
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPICTOp 0x98 #define PictVer...
218,679,799,744,453,460,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12665
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12665
2,652
ImageMagick
db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f
None
1
static MagickBooleanType WritePALMImage(const ImageInfo *image_info, Image *image) { ExceptionInfo *exception; MagickBooleanType status; MagickOffsetType currentOffset, offset, scene; MagickSizeType cc; PixelPacket transpix; QuantizeInfo *quantize_info; register Ind...
326,733,059,304,932,100,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12664
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12664
160,050
ImageMagick
db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f
None
0
static MagickBooleanType WritePALMImage(const ImageInfo *image_info, Image *image) { ExceptionInfo *exception; MagickBooleanType status; MagickOffsetType currentOffset, offset, scene; MagickSizeType cc; PixelPacket transpix; QuantizeInfo *quantize_info; register Ind...
188,729,318,137,706,140,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12664
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12664
2,654
ImageMagick
6233ef75bb973745ab1092b59aea8fe316f09074
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6233ef75bb973745ab1092b59aea8fe316f09074
None
1
static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image) { MagickBooleanType status; register const IndexPacket *indexes; register const PixelPacket *p; register ssize_t i, x; register unsigned char *q; size_t depth, packet_size; ssize_t y;...
48,387,372,742,263,020,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12663
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12663
160,052
ImageMagick
6233ef75bb973745ab1092b59aea8fe316f09074
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6233ef75bb973745ab1092b59aea8fe316f09074
None
0
static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image) { MagickBooleanType status; register const IndexPacket *indexes; register const PixelPacket *p; register ssize_t i, x; register unsigned char *q; size_t depth, packet_size; ssize_t y;...
65,995,654,260,245,880,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12663
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12663
2,655
ImageMagick
73a2bad43d157acfe360595feee739b4cc4406cb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73a2bad43d157acfe360595feee739b4cc4406cb
None
1
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 DisableMSCWarning(4310) static const char XMPProfile[]= { "<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n" "<x:xmpmeta xmlns:x=\"adobe:ns...
295,540,819,852,515,800,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12662
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12662
160,053
ImageMagick
73a2bad43d157acfe360595feee739b4cc4406cb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73a2bad43d157acfe360595feee739b4cc4406cb
None
0
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 DisableMSCWarning(4310) static const char XMPProfile[]= { "<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n" "<x:xmpmeta xmlns:x=\"adobe:ns...
187,132,738,061,883,530,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12662
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12662
2,658
ImageMagick
3320955045e5a2a22c13a04fa9422bb809e75eda
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3320955045e5a2a22c13a04fa9422bb809e75eda
None
1
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; int unique_filenames; ssize_t y...
230,970,568,755,587,880,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12641
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12641
160,054
ImageMagick
3320955045e5a2a22c13a04fa9422bb809e75eda
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3320955045e5a2a22c13a04fa9422bb809e75eda
None
0
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; int unique_filenames; ssize_t y...
295,095,777,977,334,900,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-12641
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12641
2,662
ImageMagick
e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
1
static MagickBooleanType ProcessMSLScript(const ImageInfo *image_info, Image **image,ExceptionInfo *exception) { char message[MagickPathExtent]; Image *msl_image; int status; ssize_t n; MSLInfo msl_info; xmlSAXHandler sax_modules; xmlSAXHandlerPtr sax_handler; /* ...
112,895,750,210,052,900,000,000,000,000,000,000,000
msl.c
158,414,803,465,023,320,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-12427
The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function.
https://nvd.nist.gov/vuln/detail/CVE-2017-12427
160,057
ImageMagick
e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b
https://github.com/ImageMagick/ImageMagick/issues/636
0
static MagickBooleanType ProcessMSLScript(const ImageInfo *image_info, Image **image,ExceptionInfo *exception) { char message[MagickPathExtent]; Image *msl_image; int status; ssize_t n; MSLInfo msl_info; xmlSAXHandler sax_modules; xmlSAXHandlerPtr sax_handler; /* ...
135,754,561,457,292,280,000,000,000,000,000,000,000
msl.c
325,153,737,108,310,430,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-12427
The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function.
https://nvd.nist.gov/vuln/detail/CVE-2017-12427
2,663
linux
ea6789980fdaa610d7eb63602c746bf6ec70cd2b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
assoc_array: Fix a buggy node-splitting case This fixes CVE-2017-12193. Fix a case in the assoc_array implementation in which a new leaf is added that needs to go into a node that happens to be full, where the existing leaves in that node cluster together at that level to the exclusion of new leaf. What needs to hap...
1
static bool assoc_array_insert_into_terminal_node(struct assoc_array_edit *edit, const struct assoc_array_ops *ops, const void *index_key, struct assoc_array_walk_result *result) { struct assoc_array_shortcut *shortcut, *new_s0; struct assoc_array_node *node, *new_n0, *new_n1, *side; struct a...
253,577,312,062,185,030,000,000,000,000,000,000,000
assoc_array.c
298,293,148,560,020,940,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-12193
The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link c...
https://nvd.nist.gov/vuln/detail/CVE-2017-12193
160,058
linux
ea6789980fdaa610d7eb63602c746bf6ec70cd2b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
assoc_array: Fix a buggy node-splitting case This fixes CVE-2017-12193. Fix a case in the assoc_array implementation in which a new leaf is added that needs to go into a node that happens to be full, where the existing leaves in that node cluster together at that level to the exclusion of new leaf. What needs to hap...
0
static bool assoc_array_insert_into_terminal_node(struct assoc_array_edit *edit, const struct assoc_array_ops *ops, const void *index_key, struct assoc_array_walk_result *result) { struct assoc_array_shortcut *shortcut, *new_s0; struct assoc_array_node *node, *new_n0, *new_n1, *side; struct a...
81,118,548,884,591,770,000,000,000,000,000,000,000
assoc_array.c
22,003,643,060,369,240,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-12193
The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link c...
https://nvd.nist.gov/vuln/detail/CVE-2017-12193
2,676
FFmpeg
ffcc82219cef0928bed2d558b19ef6ea35634130
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/ffcc82219cef0928bed2d558b19ef6ea35634130
avformat/rtmppkt: Convert ff_amf_get_field_value() to bytestream2 Fixes: out of array accesses Found-by: JunDong Xie of Ant-financial Light-Year Security Lab Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
int ff_amf_get_field_value(const uint8_t *data, const uint8_t *data_end, const uint8_t *name, uint8_t *dst, int dst_size) { int namelen = strlen(name); int len; while (*data != AMF_DATA_TYPE_OBJECT && data < data_end) { len = ff_amf_tag_size(data, data_end); ...
65,922,353,615,166,360,000,000,000,000,000,000,000
rtmppkt.c
39,451,849,705,085,110,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-11665
The ff_amf_get_field_value function in libavformat/rtmppkt.c in FFmpeg 3.3.2 allows remote RTMP servers to cause a denial of service (Segmentation Violation and application crash) via a crafted stream.
https://nvd.nist.gov/vuln/detail/CVE-2017-11665
160,069
FFmpeg
ffcc82219cef0928bed2d558b19ef6ea35634130
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/ffcc82219cef0928bed2d558b19ef6ea35634130
avformat/rtmppkt: Convert ff_amf_get_field_value() to bytestream2 Fixes: out of array accesses Found-by: JunDong Xie of Ant-financial Light-Year Security Lab Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
int ff_amf_get_field_value(const uint8_t *data, const uint8_t *data_end, static int amf_get_field_value2(GetByteContext *gb, const uint8_t *name, uint8_t *dst, int dst_size) { int namelen = strlen(name); int len; while (bytestream2_peek_byte(gb) != AMF_DATA_TYPE_OBJECT && by...
307,907,888,267,036,370,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-11665
The ff_amf_get_field_value function in libavformat/rtmppkt.c in FFmpeg 3.3.2 allows remote RTMP servers to cause a denial of service (Segmentation Violation and application crash) via a crafted stream.
https://nvd.nist.gov/vuln/detail/CVE-2017-11665
2,683
ImageMagick
a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78
None
1
static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char colorspace[MaxTextExtent], text[MaxTextExtent]; Image *image; IndexPacket *indexes; long x_offset, y_offset; MagickBooleanType status; MagickPixelPacket pixel; QuantumAny range...
255,352,715,063,295,070,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2017-11523
The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.
https://nvd.nist.gov/vuln/detail/CVE-2017-11523
160,076
ImageMagick
a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78
None
0
static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char colorspace[MaxTextExtent], text[MaxTextExtent]; Image *image; IndexPacket *indexes; long x_offset, y_offset; MagickBooleanType status; MagickPixelPacket pixel; QuantumAny range...
22,721,170,066,440,524,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2017-11523
The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.
https://nvd.nist.gov/vuln/detail/CVE-2017-11523
2,684
ImageMagick
816ecab6c532ae086ff4186b3eaf4aa7092d536f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/816ecab6c532ae086ff4186b3eaf4aa7092d536f
https://github.com/ImageMagick/ImageMagick/issues/58
1
static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info, const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception) { char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[32], zlib_vers[32]; Image *image; ImageInfo *image_info; char s[2]; const ch...
46,130,426,879,440,080,000,000,000,000,000,000,000
png.c
85,174,790,945,754,270,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-11522
The WriteOnePNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11522
160,077
ImageMagick
816ecab6c532ae086ff4186b3eaf4aa7092d536f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/816ecab6c532ae086ff4186b3eaf4aa7092d536f
https://github.com/ImageMagick/ImageMagick/issues/58
0
static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info, const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception) { char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[32], zlib_vers[32]; Image *image; ImageInfo *image_info; char s[2]; const ch...
19,355,422,623,847,822,000,000,000,000,000,000,000
png.c
30,611,584,455,442,043,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-11522
The WriteOnePNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11522
2,685
linux
3b2d69114fefa474fca542e51119036dceb4aa6f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f
ACPICA: Namespace: fix operand cache leak ACPICA commit a23325b2e583556eae88ed3f764e457786bf4df6 I found some ACPI operand cache leaks in ACPI early abort cases. Boot log of ACPI operand cache leak is as follows: >[ 0.174332] ACPI: Added _OSI(Module Device) >[ 0.175504] ACPI: Added _OSI(Processor Device) >[ ...
1
void acpi_ns_terminate(void) { acpi_status status; ACPI_FUNCTION_TRACE(ns_terminate); #ifdef ACPI_EXEC_APP { union acpi_operand_object *prev; union acpi_operand_object *next; /* Delete any module-level code blocks */ next = acpi_gbl_module_code_list; while (next) { prev = next; next = next-...
280,039,072,811,556,760,000,000,000,000,000,000,000
nsutils.c
109,243,291,210,227,210,000,000,000,000,000,000,000
[ "CWE-755" ]
CVE-2017-11472
The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craft...
https://nvd.nist.gov/vuln/detail/CVE-2017-11472
160,078
linux
3b2d69114fefa474fca542e51119036dceb4aa6f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f
ACPICA: Namespace: fix operand cache leak ACPICA commit a23325b2e583556eae88ed3f764e457786bf4df6 I found some ACPI operand cache leaks in ACPI early abort cases. Boot log of ACPI operand cache leak is as follows: >[ 0.174332] ACPI: Added _OSI(Module Device) >[ 0.175504] ACPI: Added _OSI(Processor Device) >[ ...
0
void acpi_ns_terminate(void) { acpi_status status; union acpi_operand_object *prev; union acpi_operand_object *next; ACPI_FUNCTION_TRACE(ns_terminate); /* Delete any module-level code blocks */ next = acpi_gbl_module_code_list; while (next) { prev = next; next = next->method.mutex; prev->method.m...
117,645,864,794,316,930,000,000,000,000,000,000,000
nsutils.c
245,076,048,450,368,900,000,000,000,000,000,000,000
[ "CWE-755" ]
CVE-2017-11472
The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craft...
https://nvd.nist.gov/vuln/detail/CVE-2017-11472
2,709
ImageMagick
1737ac82b335e53376382c07b9a500d73dd2aa11
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1737ac82b335e53376382c07b9a500d73dd2aa11
None
1
static Image *ReadJPEGImage(const ImageInfo *image_info, ExceptionInfo *exception) { char value[MaxTextExtent]; const char *option; ErrorManager error_manager; Image *image; IndexPacket index; JSAMPLE *volatile jpeg_pixels; JSAMPROW scanline[1]; MagickBooleanType ...
139,760,603,405,269,560,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-11448
The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11448
160,099
ImageMagick
1737ac82b335e53376382c07b9a500d73dd2aa11
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1737ac82b335e53376382c07b9a500d73dd2aa11
None
0
static Image *ReadJPEGImage(const ImageInfo *image_info, ExceptionInfo *exception) { char value[MaxTextExtent]; const char *option; ErrorManager error_manager; Image *image; IndexPacket index; JSAMPLE *volatile jpeg_pixels; JSAMPROW scanline[1]; MagickBooleanType ...
59,141,832,454,392,870,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-11448
The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11448
2,710
ImageMagick
8c10b9247509c0484b55330458846115131ec2ae
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8c10b9247509c0484b55330458846115131ec2ae
None
1
static Image *ReadSCREENSHOTImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; assert(image_info->signature == MagickSignature); if (image_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s", image_info->filename); assert(exception != (E...
220,742,260,935,559,080,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-11447
The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-11447
160,100
ImageMagick
8c10b9247509c0484b55330458846115131ec2ae
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8c10b9247509c0484b55330458846115131ec2ae
None
0
static Image *ReadSCREENSHOTImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; assert(image_info->signature == MagickSignature); if (image_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s", image_info->filename); assert(exception != (E...
190,010,828,555,515,870,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-11447
The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-11447
2,716
yara
4a342f01e5439b9bb901aff1c6c23c536baeeb3f
https://github.com/VirusTotal/yara
https://github.com/VirusTotal/yara/commit/4a342f01e5439b9bb901aff1c6c23c536baeeb3f
Fix heap overflow (reported by Jurriaan Bremer) When setting a new array item with yr_object_array_set_item() the array size is doubled if the index for the new item is larger than the already allocated ones. No further checks were made to ensure that the index fits into the array after doubling its capacity. If the a...
1
int yr_object_array_set_item( YR_OBJECT* object, YR_OBJECT* item, int index) { YR_OBJECT_ARRAY* array; int i; int count; assert(index >= 0); assert(object->type == OBJECT_TYPE_ARRAY); array = object_as_array(object); if (array->items == NULL) { count = yr_max(64, (index + 1) * 2);...
226,909,454,874,264,900,000,000,000,000,000,000,000
object.c
256,017,910,395,129,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-11328
Heap buffer overflow in the yr_object_array_set_item() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11328
160,104
yara
4a342f01e5439b9bb901aff1c6c23c536baeeb3f
https://github.com/VirusTotal/yara
https://github.com/VirusTotal/yara/commit/4a342f01e5439b9bb901aff1c6c23c536baeeb3f
Fix heap overflow (reported by Jurriaan Bremer) When setting a new array item with yr_object_array_set_item() the array size is doubled if the index for the new item is larger than the already allocated ones. No further checks were made to ensure that the index fits into the array after doubling its capacity. If the a...
0
int yr_object_array_set_item( YR_OBJECT* object, YR_OBJECT* item, int index) { YR_OBJECT_ARRAY* array; int i; int count; assert(index >= 0); assert(object->type == OBJECT_TYPE_ARRAY); array = object_as_array(object); if (array->items == NULL) { count = 64; while (count <= ind...
96,846,261,094,929,950,000,000,000,000,000,000,000
object.c
146,010,632,680,346,480,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-11328
Heap buffer overflow in the yr_object_array_set_item() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11328
2,717
ImageMagick
8ca35831e91c3db8c6d281d09b605001003bec08
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8ca35831e91c3db8c6d281d09b605001003bec08
coders/png.c: Stop a memory leak in read_user_chunk_callback() (reference https://github.com/ImageMagick/ImageMagick/issues/517).
1
static Image *ReadOnePNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { /* Read one PNG image */ /* To do: Read the tEXt/Creation Time chunk into the date:create property */ Image *image; char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[3...
6,716,675,637,673,233,000,000,000,000,000,000,000
png.c
228,033,773,830,255,870,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-11310
The read_user_chunk_callback function in coders\png.c in ImageMagick 7.0.6-1 Q16 2017-06-21 (beta) has memory leak vulnerabilities via crafted PNG files.
https://nvd.nist.gov/vuln/detail/CVE-2017-11310
160,105
ImageMagick
8ca35831e91c3db8c6d281d09b605001003bec08
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8ca35831e91c3db8c6d281d09b605001003bec08
coders/png.c: Stop a memory leak in read_user_chunk_callback() (reference https://github.com/ImageMagick/ImageMagick/issues/517).
0
static Image *ReadOnePNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { /* Read one PNG image */ /* To do: Read the tEXt/Creation Time chunk into the date:create property */ Image *image; char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[3...
66,321,349,650,092,410,000,000,000,000,000,000,000
png.c
133,390,610,587,338,430,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-11310
The read_user_chunk_callback function in coders\png.c in ImageMagick 7.0.6-1 Q16 2017-06-21 (beta) has memory leak vulnerabilities via crafted PNG files.
https://nvd.nist.gov/vuln/detail/CVE-2017-11310
2,718
linux
f991af3daabaecff34684fd51fac80319d1baad1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1
mqueue: fix a use-after-free in sys_mq_notify() The retry logic for netlink_attachskb() inside sys_mq_notify() is nasty and vulnerable: 1) The sock refcnt is already released when retry is needed 2) The fd is controllable by user-space because we already release the file refcnt so we when retry but the fd has bee...
1
static int do_mq_notify(mqd_t mqdes, const struct sigevent *notification) { int ret; struct fd f; struct sock *sock; struct inode *inode; struct mqueue_inode_info *info; struct sk_buff *nc; audit_mq_notify(mqdes, notification); nc = NULL; sock = NULL; if (notification != NULL) { if (unlikely(notification-...
64,115,780,527,379,680,000,000,000,000,000,000,000
mqueue.c
183,724,114,749,802,100,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-11176
160,106
linux
f991af3daabaecff34684fd51fac80319d1baad1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1
mqueue: fix a use-after-free in sys_mq_notify() The retry logic for netlink_attachskb() inside sys_mq_notify() is nasty and vulnerable: 1) The sock refcnt is already released when retry is needed 2) The fd is controllable by user-space because we already release the file refcnt so we when retry but the fd has bee...
0
static int do_mq_notify(mqd_t mqdes, const struct sigevent *notification) { int ret; struct fd f; struct sock *sock; struct inode *inode; struct mqueue_inode_info *info; struct sk_buff *nc; audit_mq_notify(mqdes, notification); nc = NULL; sock = NULL; if (notification != NULL) { if (unlikely(notification-...
188,893,110,705,841,960,000,000,000,000,000,000,000
mqueue.c
202,842,413,276,995,580,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-11176
2,721
gnome-session
b0dc999e0b45355314616321dbb6cb71e729fc9d
https://github.com/GNOME/gnome-session
https://github.com/GNOME/gnome-session/commit/b0dc999e0b45355314616321dbb6cb71e729fc9d
[gsm] Delay the creation of the GsmXSMPClient until it really exists We used to create the GsmXSMPClient before the XSMP connection is really accepted. This can lead to some issues, though. An example is: https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting: "What is happening is that a new client (probabl...
1
accept_ice_connection (GIOChannel *source, GIOCondition condition, GsmIceConnectionData *data) { IceListenObj listener; IceConn ice_conn; IceAcceptStatus status; GsmClient *client; GsmXsmpServe...
115,853,477,812,783,840,000,000,000,000,000,000,000
gsm-xsmp-server.c
139,028,771,084,308,010,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-11171
Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a...
https://nvd.nist.gov/vuln/detail/CVE-2017-11171
160,109
gnome-session
b0dc999e0b45355314616321dbb6cb71e729fc9d
https://github.com/GNOME/gnome-session
https://github.com/GNOME/gnome-session/commit/b0dc999e0b45355314616321dbb6cb71e729fc9d
[gsm] Delay the creation of the GsmXSMPClient until it really exists We used to create the GsmXSMPClient before the XSMP connection is really accepted. This can lead to some issues, though. An example is: https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting: "What is happening is that a new client (probabl...
0
accept_ice_connection (GIOChannel *source, GIOCondition condition, GsmIceConnectionData *data) { IceConn ice_conn; IceAcceptStatus status; g_debug ("GsmXsmpServer: accept_ice_connection()"); ice_conn = Ic...
138,054,033,130,075,100,000,000,000,000,000,000,000
gsm-xsmp-server.c
203,239,007,314,094,620,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-11171
Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a...
https://nvd.nist.gov/vuln/detail/CVE-2017-11171
2,725
radare2
c57997e76ec70862174a1b3b3aeb62a6f8570e85
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/c57997e76ec70862174a1b3b3aeb62a6f8570e85
Fix r2_hbo_grub_memmove ext2 crash
1
grub_disk_read (grub_disk_t disk, grub_disk_addr_t sector, grub_off_t offset, grub_size_t size, void *buf) { char *tmp_buf; unsigned real_offset; /* First of all, check if the region is within the disk. */ if (grub_disk_adjust_range (disk, &sector, &offset, size) != GRUB_ERR_NONE) { grub_error_pus...
303,262,332,284,339,200,000,000,000,000,000,000,000
disk.c
311,683,975,526,626,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-10929
The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function i...
https://nvd.nist.gov/vuln/detail/CVE-2017-10929
160,113
radare2
c57997e76ec70862174a1b3b3aeb62a6f8570e85
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/c57997e76ec70862174a1b3b3aeb62a6f8570e85
Fix r2_hbo_grub_memmove ext2 crash
0
grub_disk_read (grub_disk_t disk, grub_disk_addr_t sector, grub_off_t offset, grub_size_t size, void *buf) { char *tmp_buf; unsigned real_offset; /* First of all, check if the region is within the disk. */ if (grub_disk_adjust_range (disk, &sector, &offset, size) != GRUB_ERR_NONE) { grub_error_pus...
116,475,755,647,267,870,000,000,000,000,000,000,000
disk.c
249,987,949,430,885,670,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-10929
The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function i...
https://nvd.nist.gov/vuln/detail/CVE-2017-10929
2,726
linux
089bc0143f489bd3a4578bdff5f4ca68fb26f341
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/089bc0143f489bd3a4578bdff5f4ca68fb26f341
xen-blkback: don't leak stack data via response ring Rather than constructing a local structure instance on the stack, fill the fields directly on the shared ring, just like other backends do. Build on the fact that all response structure flavors are actually identical (the old code did make this assumption too). Thi...
1
static void make_response(struct xen_blkif_ring *ring, u64 id, unsigned short op, int st) { struct blkif_response resp; unsigned long flags; union blkif_back_rings *blk_rings; int notify; resp.id = id; resp.operation = op; resp.status = st; spin_lock_irqsave(&ring->blk_ring_lock, fl...
3,010,677,516,050,940,000,000,000,000,000,000,000
blkback.c
154,573,801,860,346,860,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-10911
The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
https://nvd.nist.gov/vuln/detail/CVE-2017-10911
160,114
linux
089bc0143f489bd3a4578bdff5f4ca68fb26f341
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/089bc0143f489bd3a4578bdff5f4ca68fb26f341
xen-blkback: don't leak stack data via response ring Rather than constructing a local structure instance on the stack, fill the fields directly on the shared ring, just like other backends do. Build on the fact that all response structure flavors are actually identical (the old code did make this assumption too). Thi...
0
static void make_response(struct xen_blkif_ring *ring, u64 id, unsigned short op, int st) { struct blkif_response *resp; unsigned long flags; union blkif_back_rings *blk_rings; int notify; spin_lock_irqsave(&ring->blk_ring_lock, flags); blk_rings = &ring->blk_rings; /* Place on the response r...
225,829,387,305,785,700,000,000,000,000,000,000,000
blkback.c
331,399,315,042,525,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-10911
The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
https://nvd.nist.gov/vuln/detail/CVE-2017-10911
2,727
linux
385aee965b4e4c36551c362a334378d2985b722a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a
drm/virtio: don't leak bo on drm_gem_object_init failure Reported-by: 李强 <liqiang6-s@360.cn> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Link: http://patchwork.freedesktop.org/patch/msgid/20170406155941.458-1-kraxel@redhat.com
1
int virtio_gpu_object_create(struct virtio_gpu_device *vgdev, unsigned long size, bool kernel, bool pinned, struct virtio_gpu_object **bo_ptr) { struct virtio_gpu_object *bo; enum ttm_bo_type type; size_t acc_size; int ret; if (kernel) type = ttm_bo_type_kernel; else type = ttm_bo_type_device...
94,677,181,086,707,980,000,000,000,000,000,000,000
virtgpu_object.c
7,738,869,874,472,682,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-10810
Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.
https://nvd.nist.gov/vuln/detail/CVE-2017-10810
160,115
linux
385aee965b4e4c36551c362a334378d2985b722a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a
drm/virtio: don't leak bo on drm_gem_object_init failure Reported-by: 李强 <liqiang6-s@360.cn> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Link: http://patchwork.freedesktop.org/patch/msgid/20170406155941.458-1-kraxel@redhat.com
0
int virtio_gpu_object_create(struct virtio_gpu_device *vgdev, unsigned long size, bool kernel, bool pinned, struct virtio_gpu_object **bo_ptr) { struct virtio_gpu_object *bo; enum ttm_bo_type type; size_t acc_size; int ret; if (kernel) type = ttm_bo_type_kernel; else type = ttm_bo_type_device...
122,744,681,669,071,310,000,000,000,000,000,000,000
virtgpu_object.c
13,054,163,728,105,955,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-10810
Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.
https://nvd.nist.gov/vuln/detail/CVE-2017-10810
2,730
sthttpd
c0dc63a49d8605649f1d8e4a96c9b468b0bff660
https://github.com/blueness/sthttpd
https://github.com/blueness/sthttpd/commit/c0dc63a49d8605649f1d8e4a96c9b468b0bff660
Fix heap buffer overflow in de_dotdot
1
de_dotdot( char* file ) { char* cp; char* cp2; int l; /* Collapse any multiple / sequences. */ while ( ( cp = strstr( file, "//") ) != (char*) 0 ) { for ( cp2 = cp + 2; *cp2 == '/'; ++cp2 ) continue; (void) strcpy( cp + 1, cp2 ); } /* Remove leading ./ and any /./ sequences. */ ...
45,843,749,197,328,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-10671
Heap-based Buffer Overflow in the de_dotdot function in libhttpd.c in sthttpd before 2.27.1 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted filename.
https://nvd.nist.gov/vuln/detail/CVE-2017-10671
160,118
sthttpd
c0dc63a49d8605649f1d8e4a96c9b468b0bff660
https://github.com/blueness/sthttpd
https://github.com/blueness/sthttpd/commit/c0dc63a49d8605649f1d8e4a96c9b468b0bff660
Fix heap buffer overflow in de_dotdot
0
de_dotdot( char* file ) { char* cp; char* cp2; int l; /* Collapse any multiple / sequences. */ while ( ( cp = strstr( file, "//") ) != (char*) 0 ) { for ( cp2 = cp + 2; *cp2 == '/'; ++cp2 ) continue; (void) strcpy( cp + 1, cp2 ); } /* Remove leading ./ and any /./ sequences. */ ...
60,624,892,052,849,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-10671
Heap-based Buffer Overflow in the de_dotdot function in libhttpd.c in sthttpd before 2.27.1 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted filename.
https://nvd.nist.gov/vuln/detail/CVE-2017-10671
2,735
FFmpeg
1e42736b95065c69a7481d0cf55247024f54b660
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/1e42736b95065c69a7481d0cf55247024f54b660
avcodec/cdxl: Check format for BGR24 Fixes: out of array access Fixes: 1427/clusterfuzz-testcase-minimized-5020737339392000 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int cdxl_decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *pkt) { CDXLVideoContext *c = avctx->priv_data; AVFrame * const p = data; int ret, w, h, encoding, aligned_width, buf_size = pkt->size; const uint8_t *buf = pkt->data; if (buf_size ...
272,076,656,890,640,220,000,000,000,000,000,000,000
cdxl.c
286,646,798,604,789,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9996
The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not exclude the CHUNKY format, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possi...
https://nvd.nist.gov/vuln/detail/CVE-2017-9996
160,121
FFmpeg
1e42736b95065c69a7481d0cf55247024f54b660
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/1e42736b95065c69a7481d0cf55247024f54b660
avcodec/cdxl: Check format for BGR24 Fixes: out of array access Fixes: 1427/clusterfuzz-testcase-minimized-5020737339392000 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int cdxl_decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *pkt) { CDXLVideoContext *c = avctx->priv_data; AVFrame * const p = data; int ret, w, h, encoding, aligned_width, buf_size = pkt->size; const uint8_t *buf = pkt->data; if (buf_size ...
102,871,101,375,031,870,000,000,000,000,000,000,000
cdxl.c
223,048,921,965,913,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9996
The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not exclude the CHUNKY format, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possi...
https://nvd.nist.gov/vuln/detail/CVE-2017-9996
2,738
FFmpeg
6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
avcodec/webp: Always set pix_fmt Fixes: out of array access Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632 Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Reviewed-by: "Ronald S. Bultje" <rsbult...
1
static int vp8_lossy_decode_frame(AVCodecContext *avctx, AVFrame *p, int *got_frame, uint8_t *data_start, unsigned int data_size) { WebPContext *s = avctx->priv_data; AVPacket pkt; int ret; if (!s->initialized) { ff_vp8_decod...
92,038,738,073,539,860,000,000,000,000,000,000,000
webp.c
318,309,543,806,629,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9994
libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2017-9994
160,123
FFmpeg
6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
avcodec/webp: Always set pix_fmt Fixes: out of array access Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632 Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Reviewed-by: "Ronald S. Bultje" <rsbult...
0
static int vp8_lossy_decode_frame(AVCodecContext *avctx, AVFrame *p, int *got_frame, uint8_t *data_start, unsigned int data_size) { WebPContext *s = avctx->priv_data; AVPacket pkt; int ret; if (!s->initialized) { ff_vp8_decod...
80,418,567,197,548,210,000,000,000,000,000,000,000
webp.c
307,034,377,249,174,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9994
libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2017-9994
2,739
FFmpeg
a5d849b149ca67ced2d271dc84db0bc95a548abb
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a5d849b149ca67ced2d271dc84db0bc95a548abb
avformat/avidec: Limit formats in gab2 to srt and ass/ssa This prevents part of one exploit leading to an information leak Found-by: Emil Lerner and Pavel Cheremushkin Reported-by: Thierry Foucu <tfoucu@google.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int read_gab2_sub(AVFormatContext *s, AVStream *st, AVPacket *pkt) { if (pkt->size >= 7 && pkt->size < INT_MAX - AVPROBE_PADDING_SIZE && !strcmp(pkt->data, "GAB2") && AV_RL16(pkt->data + 5) == 2) { uint8_t desc[256]; int score = AVPROBE_SCORE_EXTENSION, ret; AVISt...
57,648,922,262,249,090,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-9993
FFmpeg before 2.8.12, 3.0.x and 3.1.x before 3.1.9, 3.2.x before 3.2.6, and 3.3.x before 3.3.2 does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data.
https://nvd.nist.gov/vuln/detail/CVE-2017-9993
160,124
FFmpeg
a5d849b149ca67ced2d271dc84db0bc95a548abb
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a5d849b149ca67ced2d271dc84db0bc95a548abb
avformat/avidec: Limit formats in gab2 to srt and ass/ssa This prevents part of one exploit leading to an information leak Found-by: Emil Lerner and Pavel Cheremushkin Reported-by: Thierry Foucu <tfoucu@google.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int read_gab2_sub(AVFormatContext *s, AVStream *st, AVPacket *pkt) { if (pkt->size >= 7 && pkt->size < INT_MAX - AVPROBE_PADDING_SIZE && !strcmp(pkt->data, "GAB2") && AV_RL16(pkt->data + 5) == 2) { uint8_t desc[256]; int score = AVPROBE_SCORE_EXTENSION, ret; AVISt...
330,603,969,826,715,060,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-9993
FFmpeg before 2.8.12, 3.0.x and 3.1.x before 3.1.9, 3.2.x before 3.2.6, and 3.3.x before 3.3.2 does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data.
https://nvd.nist.gov/vuln/detail/CVE-2017-9993
2,740
FFmpeg
f52fbf4f3ed02a7d872d8a102006f29b4421f360
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/f52fbf4f3ed02a7d872d8a102006f29b4421f360
avcodec/dfa: Fix off by 1 error Fixes out of array access Fixes: 1345/clusterfuzz-testcase-minimized-6062963045695488 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int decode_dds1(GetByteContext *gb, uint8_t *frame, int width, int height) { const uint8_t *frame_start = frame; const uint8_t *frame_end = frame + width * height; int mask = 0x10000, bitbuf = 0; int i, v, offset, count, segments; segments = bytestream2_get_le16(gb); while (segments--)...
311,517,746,864,273,740,000,000,000,000,000,000,000
dfa.c
52,043,501,485,622,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9992
Heap-based buffer overflow in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9992
160,125
FFmpeg
f52fbf4f3ed02a7d872d8a102006f29b4421f360
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/f52fbf4f3ed02a7d872d8a102006f29b4421f360
avcodec/dfa: Fix off by 1 error Fixes out of array access Fixes: 1345/clusterfuzz-testcase-minimized-6062963045695488 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int decode_dds1(GetByteContext *gb, uint8_t *frame, int width, int height) { const uint8_t *frame_start = frame; const uint8_t *frame_end = frame + width * height; int mask = 0x10000, bitbuf = 0; int i, v, offset, count, segments; segments = bytestream2_get_le16(gb); while (segments--)...
171,224,325,263,157,400,000,000,000,000,000,000,000
dfa.c
148,250,947,754,090,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9992
Heap-based buffer overflow in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9992
2,741
FFmpeg
441026fcb13ac23aa10edc312bdacb6445a0ad06
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/441026fcb13ac23aa10edc312bdacb6445a0ad06
avcodec/xwddec: Check bpp more completely Fixes out of array access Fixes: 1399/clusterfuzz-testcase-minimized-4866094172995584 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int xwd_decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *avpkt) { AVFrame *p = data; const uint8_t *buf = avpkt->data; int i, ret, buf_size = avpkt->size; uint32_t version, header_size, vclass, ncolors; uint32_t xoffset, be, bpp, lsize, rsi...
154,378,037,284,752,480,000,000,000,000,000,000,000
xwddec.c
294,025,484,135,912,770,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9991
Heap-based buffer overflow in the xwd_decode_frame function in libavcodec/xwddec.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ...
https://nvd.nist.gov/vuln/detail/CVE-2017-9991
160,126
FFmpeg
441026fcb13ac23aa10edc312bdacb6445a0ad06
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/441026fcb13ac23aa10edc312bdacb6445a0ad06
avcodec/xwddec: Check bpp more completely Fixes out of array access Fixes: 1399/clusterfuzz-testcase-minimized-4866094172995584 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int xwd_decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *avpkt) { AVFrame *p = data; const uint8_t *buf = avpkt->data; int i, ret, buf_size = avpkt->size; uint32_t version, header_size, vclass, ncolors; uint32_t xoffset, be, bpp, lsize, rsi...
211,690,699,807,637,840,000,000,000,000,000,000,000
xwddec.c
187,964,561,086,707,450,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9991
Heap-based buffer overflow in the xwd_decode_frame function in libavcodec/xwddec.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ...
https://nvd.nist.gov/vuln/detail/CVE-2017-9991
2,742
FFmpeg
cb243972b121b1ae6b60a78ff55a0506c69f3879
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/cb243972b121b1ae6b60a78ff55a0506c69f3879
avcodec/xpmdec: Fix multiple pointer/memory issues Most of these were found through code review in response to fixing 1466/clusterfuzz-testcase-minimized-5961584419536896 There is thus no testcase for most of this. The initial issue was Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/maste...
1
static uint32_t color_string_to_rgba(const char *p, int len) { uint32_t ret = 0xFF000000; const ColorEntry *entry; char color_name[100]; if (*p == '#') { p++; len--; if (len == 3) { ret |= (hex_char_to_number(p[2]) << 4) | (hex_char_to_numbe...
238,040,376,254,480,200,000,000,000,000,000,000,000
xpmdec.c
78,083,234,821,023,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9990
Stack-based buffer overflow in the color_string_to_rgba function in libavcodec/xpmdec.c in FFmpeg 3.3 before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9990
160,127
FFmpeg
cb243972b121b1ae6b60a78ff55a0506c69f3879
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/cb243972b121b1ae6b60a78ff55a0506c69f3879
avcodec/xpmdec: Fix multiple pointer/memory issues Most of these were found through code review in response to fixing 1466/clusterfuzz-testcase-minimized-5961584419536896 There is thus no testcase for most of this. The initial issue was Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/maste...
0
static uint32_t color_string_to_rgba(const char *p, int len) { uint32_t ret = 0xFF000000; const ColorEntry *entry; char color_name[100]; len = FFMIN(FFMAX(len, 0), sizeof(color_name) - 1); if (*p == '#') { p++; len--; if (len == 3) { ret |= (hex_char_to_nu...
309,528,883,027,056,070,000,000,000,000,000,000,000
xpmdec.c
301,837,735,761,470,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9990
Stack-based buffer overflow in the color_string_to_rgba function in libavcodec/xpmdec.c in FFmpeg 3.3 before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9990
2,745
linux
20e2b791796bd68816fa115f12be5320de2b8021
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021
ALSA: msnd: Optimize / harden DSP and MIDI loops The ISA msnd drivers have loops fetching the ring-buffer head, tail and size values inside the loops. Such codes are inefficient and fragile. This patch optimizes it, and also adds the sanity check to avoid the endless loops. Bugzilla: https://bugzilla.kernel.org/sho...
1
void snd_msndmidi_input_read(void *mpuv) { unsigned long flags; struct snd_msndmidi *mpu = mpuv; void *pwMIDQData = mpu->dev->mappedbase + MIDQ_DATA_BUFF; spin_lock_irqsave(&mpu->input_lock, flags); while (readw(mpu->dev->MIDQ + JQS_wTail) != readw(mpu->dev->MIDQ + JQS_wHead)) { u16 wTmp, val; va...
241,508,483,468,154,000,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-9984
The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl...
https://nvd.nist.gov/vuln/detail/CVE-2017-9984
160,130
linux
20e2b791796bd68816fa115f12be5320de2b8021
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021
ALSA: msnd: Optimize / harden DSP and MIDI loops The ISA msnd drivers have loops fetching the ring-buffer head, tail and size values inside the loops. Such codes are inefficient and fragile. This patch optimizes it, and also adds the sanity check to avoid the endless loops. Bugzilla: https://bugzilla.kernel.org/sho...
0
void snd_msndmidi_input_read(void *mpuv) { unsigned long flags; struct snd_msndmidi *mpu = mpuv; void *pwMIDQData = mpu->dev->mappedbase + MIDQ_DATA_BUFF; u16 head, tail, size; spin_lock_irqsave(&mpu->input_lock, flags); head = readw(mpu->dev->MIDQ + JQS_wHead); tail = readw(mpu->dev->MIDQ + JQS_wTail); s...
297,516,602,952,991,100,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-9984
The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl...
https://nvd.nist.gov/vuln/detail/CVE-2017-9984
2,746
linux
20e2b791796bd68816fa115f12be5320de2b8021
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021
ALSA: msnd: Optimize / harden DSP and MIDI loops The ISA msnd drivers have loops fetching the ring-buffer head, tail and size values inside the loops. Such codes are inefficient and fragile. This patch optimizes it, and also adds the sanity check to avoid the endless loops. Bugzilla: https://bugzilla.kernel.org/sho...
1
static irqreturn_t snd_msnd_interrupt(int irq, void *dev_id) { struct snd_msnd *chip = dev_id; void *pwDSPQData = chip->mappedbase + DSPQ_DATA_BUFF; /* Send ack to DSP */ /* inb(chip->io + HP_RXL); */ /* Evaluate queued DSP messages */ while (readw(chip->DSPQ + JQS_wTail) != readw(chip->DSPQ + JQS_wHead...
157,005,536,200,453,300,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-9984
The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl...
https://nvd.nist.gov/vuln/detail/CVE-2017-9984
160,131
linux
20e2b791796bd68816fa115f12be5320de2b8021
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021
ALSA: msnd: Optimize / harden DSP and MIDI loops The ISA msnd drivers have loops fetching the ring-buffer head, tail and size values inside the loops. Such codes are inefficient and fragile. This patch optimizes it, and also adds the sanity check to avoid the endless loops. Bugzilla: https://bugzilla.kernel.org/sho...
0
static irqreturn_t snd_msnd_interrupt(int irq, void *dev_id) { struct snd_msnd *chip = dev_id; void *pwDSPQData = chip->mappedbase + DSPQ_DATA_BUFF; u16 head, tail, size; /* Send ack to DSP */ /* inb(chip->io + HP_RXL); */ /* Evaluate queued DSP messages */ head = readw(chip->DSPQ + JQS_wHead); tail =...
177,448,939,680,897,020,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-9984
The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl...
https://nvd.nist.gov/vuln/detail/CVE-2017-9984
2,752
radare2
65000a7fd9eea62359e6d6714f17b94a99a82edd
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/65000a7fd9eea62359e6d6714f17b94a99a82edd
Fix #7723 - crash in ext2 GRUB code because of variable size array in stack
1
grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock) { struct grub_ext2_data *data = node->data; struct grub_ext2_inode *inode = &node->inode; int blknr = -1; unsigned int blksz = EXT2_BLOCK_SIZE (data); int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data); if (grub_le_to_cpu32(inode->flags...
210,811,521,877,163,650,000,000,000,000,000,000,000
ext2.c
53,758,202,141,423,640,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9763
The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.
https://nvd.nist.gov/vuln/detail/CVE-2017-9763
160,136
radare2
65000a7fd9eea62359e6d6714f17b94a99a82edd
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/65000a7fd9eea62359e6d6714f17b94a99a82edd
Fix #7723 - crash in ext2 GRUB code because of variable size array in stack
0
grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock) { struct grub_ext2_data *data = node->data; struct grub_ext2_inode *inode = &node->inode; int blknr = -1; unsigned int blksz = EXT2_BLOCK_SIZE (data); int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data); if (grub_le_to_cpu32(inode->flags...
273,282,090,940,190,200,000,000,000,000,000,000,000
ext2.c
281,764,185,056,404,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9763
The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.
https://nvd.nist.gov/vuln/detail/CVE-2017-9763
2,757
linux
07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
drm/vmwgfx: Make sure backup_handle is always valid When vmw_gb_surface_define_ioctl() is called with an existing buffer, we end up returning an uninitialized variable in the backup_handle. The fix is to first initialize backup_handle to 0 just to be sure, and second, when a user-provided buffer is found, we will use...
1
int vmw_gb_surface_define_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct vmw_private *dev_priv = vmw_priv(dev); struct vmw_user_surface *user_srf; struct vmw_surface *srf; struct vmw_resource *res; struct vmw_resource *tmp; union drm_vmw_gb_surface_create_arg *arg = (union...
174,250,850,425,960,800,000,000,000,000,000,000,000
vmwgfx_surface.c
245,292,923,373,553,170,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-9605
The vmw_gb_surface_define_ioctl function (accessible via DRM_IOCTL_VMW_GB_SURFACE_CREATE) in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.11.4 defines a backup_handle variable but does not give it an initial value. If one attempts to create a GB surface, with a previously allocated DMA buffer t...
https://nvd.nist.gov/vuln/detail/CVE-2017-9605
160,141
linux
07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
drm/vmwgfx: Make sure backup_handle is always valid When vmw_gb_surface_define_ioctl() is called with an existing buffer, we end up returning an uninitialized variable in the backup_handle. The fix is to first initialize backup_handle to 0 just to be sure, and second, when a user-provided buffer is found, we will use...
0
int vmw_gb_surface_define_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct vmw_private *dev_priv = vmw_priv(dev); struct vmw_user_surface *user_srf; struct vmw_surface *srf; struct vmw_resource *res; struct vmw_resource *tmp; union drm_vmw_gb_surface_create_arg *arg = (union...
333,843,172,164,796,700,000,000,000,000,000,000,000
vmwgfx_surface.c
61,002,937,846,300,540,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-9605
The vmw_gb_surface_define_ioctl function (accessible via DRM_IOCTL_VMW_GB_SURFACE_CREATE) in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.11.4 defines a backup_handle variable but does not give it an initial value. If one attempts to create a GB surface, with a previously allocated DMA buffer t...
https://nvd.nist.gov/vuln/detail/CVE-2017-9605
2,758
mruby
5c114c91d4ff31859fcd84cf8bf349b737b90d99
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99
Clear unused stack region that may refer freed objects; fix #3596
1
mark_context_stack(mrb_state *mrb, struct mrb_context *c) { size_t i; size_t e; if (c->stack == NULL) return; e = c->stack - c->stbase; if (c->ci) e += c->ci->nregs; if (c->stbase + e > c->stend) e = c->stend - c->stbase; for (i=0; i<e; i++) { mrb_value v = c->stbase[i]; if (!mrb_immedi...
125,574,988,804,055,740,000,000,000,000,000,000,000
gc.c
192,625,814,561,719,470,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-9527
The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9527