idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
160,438 | libevent | 96f64a022014a208105ead6c8a7066018449d86d | https://github.com/libevent/libevent | https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d | evdns: name_parse(): fix remote stack overread
@asn-the-goblin-slayer:
"the name_parse() function in libevent's DNS code is vulnerable to a buffer overread.
971 if (cp != name_out) {
972 if (cp + 1 >= end) return -1;
973 *cp++ = '.';
974 }
975 if (cp + ... | 0 | name_parse(u8 *packet, int length, int *idx, char *name_out, int name_out_len) {
int name_end = -1;
int j = *idx;
int ptr_count = 0;
#define GET32(x) do { if (j + 4 > length) goto err; memcpy(&t32_, packet + j, 4); j += 4; x = ntohl(t32_); } while (0)
#define GET16(x) do { if (j + 2 > length) goto err; memcpy(&t_, p... | 92,910,843,249,159,790,000,000,000,000,000,000,000 | evdns.c | 115,534,086,427,827,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10195 | The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read. | https://nvd.nist.gov/vuln/detail/CVE-2016-10195 |
3,092 | FFmpeg | a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 | ffserver: Check chunk size
Fixes out of array access
Fixes: poc_ffserver.py
Found-by: Paul Cher <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int http_receive_data(HTTPContext *c)
{
HTTPContext *c1;
int len, loop_run = 0;
while (c->chunked_encoding && !c->chunk_size &&
c->buffer_end > c->buffer_ptr) {
/* read chunk header, if present */
len = recv(c->fd, c->buffer_ptr, 1, 0);
if (len < 0) {
... | 226,374,556,346,204,150,000,000,000,000,000,000,000 | ffserver.c | 10,780,386,245,231,873,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10192 | Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size. | https://nvd.nist.gov/vuln/detail/CVE-2016-10192 |
160,439 | FFmpeg | a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 | ffserver: Check chunk size
Fixes out of array access
Fixes: poc_ffserver.py
Found-by: Paul Cher <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int http_receive_data(HTTPContext *c)
{
HTTPContext *c1;
int len, loop_run = 0;
while (c->chunked_encoding && !c->chunk_size &&
c->buffer_end > c->buffer_ptr) {
/* read chunk header, if present */
len = recv(c->fd, c->buffer_ptr, 1, 0);
if (len < 0) {
... | 174,391,890,357,674,700,000,000,000,000,000,000,000 | ffserver.c | 135,296,140,921,599,870,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10192 | Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size. | https://nvd.nist.gov/vuln/detail/CVE-2016-10192 |
3,100 | bitlbee | 701ab8129ba9ea64f569daedca9a8603abad740f | https://github.com/bitlbee/bitlbee | https://github.com/bitlbee/bitlbee/commit/701ab8129ba9ea64f569daedca9a8603abad740f | imcb_file_send_start: handle ft attempts from non-existing users | 1 | file_transfer_t *imcb_file_send_start(struct im_connection *ic, char *handle, char *file_name, size_t file_size)
{
bee_t *bee = ic->bee;
bee_user_t *bu = bee_user_by_handle(bee, ic, handle);
if (bee->ui->ft_in_start) {
return bee->ui->ft_in_start(bee, bu, file_name, file_size);
} else {
return NULL;
}
}... | 295,316,547,559,436,450,000,000,000,000,000,000,000 | bee_ft.c | 22,913,504,337,913,935,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10189 | BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list. | https://nvd.nist.gov/vuln/detail/CVE-2016-10189 |
160,448 | bitlbee | 701ab8129ba9ea64f569daedca9a8603abad740f | https://github.com/bitlbee/bitlbee | https://github.com/bitlbee/bitlbee/commit/701ab8129ba9ea64f569daedca9a8603abad740f | imcb_file_send_start: handle ft attempts from non-existing users | 0 | file_transfer_t *imcb_file_send_start(struct im_connection *ic, char *handle, char *file_name, size_t file_size)
{
bee_t *bee = ic->bee;
bee_user_t *bu = bee_user_by_handle(bee, ic, handle);
if (bee->ui->ft_in_start && bu) {
return bee->ui->ft_in_start(bee, bu, file_name, file_size);
} else {
return NULL... | 96,363,477,977,669,400,000,000,000,000,000,000,000 | bee_ft.c | 79,543,836,780,597,760,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10189 | BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list. | https://nvd.nist.gov/vuln/detail/CVE-2016-10189 |
3,103 | php-src | 16b3003ffc6393e250f069aa28a78dc5a2c064b2 | https://github.com/php/php-src | https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 | Fix bug #73825 - Heap out of bounds read on unserialize in finish_nested_data() | 1 | static inline long object_common1(UNSERIALIZE_PARAMETER, zend_class_entry *ce)
{
long elements;
elements = parse_iv2((*p) + 2, p);
(*p) += 2;
if (ce->serialize == NULL) {
object_init_ex(*rval, ce);
} else {
/* If this class implements Serializable, it should not land here but in object_custom(). The ... | 67,720,542,164,557,350,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10161 | The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10161 |
160,454 | php-src | 16b3003ffc6393e250f069aa28a78dc5a2c064b2 | https://github.com/php/php-src | https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 | Fix bug #73825 - Heap out of bounds read on unserialize in finish_nested_data() | 0 | static inline long object_common1(UNSERIALIZE_PARAMETER, zend_class_entry *ce)
{
long elements;
if( *p >= max - 2) {
zend_error(E_WARNING, "Bad unserialize data");
return -1;
}
elements = parse_iv2((*p) + 2, p);
(*p) += 2;
if (ce->serialize == NULL) {
object_init_ex(*rval, ce);
} else {
/* If ... | 52,996,959,303,945,110,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10161 | The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10161 |
3,105 | php-src | 1cda0d7c2ffb62d8331c64e703131d9cabdc03ea | https://github.com/php/php-src | https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea | Fix bug #73737 FPE when parsing a tag format | 1 | static size_t exif_convert_any_to_int(void *value, int format, int motorola_intel TSRMLS_DC)
{
int s_den;
unsigned u_den;
switch(format) {
case TAG_FMT_SBYTE: return *(signed char *)value;
case TAG_FMT_BYTE: return *(uchar *)value;
case TAG_FMT_USHORT: return php_ifd_get16u(value, motorola_int... | 117,898,004,511,095,570,000,000,000,000,000,000,000 | exif.c | 125,847,680,861,239,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-10158 | The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1. | https://nvd.nist.gov/vuln/detail/CVE-2016-10158 |
160,456 | php-src | 1cda0d7c2ffb62d8331c64e703131d9cabdc03ea | https://github.com/php/php-src | https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea | Fix bug #73737 FPE when parsing a tag format | 0 | static size_t exif_convert_any_to_int(void *value, int format, int motorola_intel TSRMLS_DC)
{
int s_den;
unsigned u_den;
switch(format) {
case TAG_FMT_SBYTE: return *(signed char *)value;
case TAG_FMT_BYTE: return *(uchar *)value;
case TAG_FMT_USHORT: return php_ifd_get16u(value, motorola_int... | 167,339,613,556,723,130,000,000,000,000,000,000,000 | exif.c | 234,617,860,043,523,420,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-10158 | The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1. | https://nvd.nist.gov/vuln/detail/CVE-2016-10158 |
3,106 | systemd | 06eeacb6fe029804f296b065b3ce91e796e1cd0e | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/06eeacb6fe029804f296b065b3ce91e796e1cd0e | basic: fix touch() creating files with 07777 mode
mode_t is unsigned, so MODE_INVALID < 0 can never be true.
This fixes a possible DoS where any user could fill /run by writing to
a world-writable /run/systemd/show-status. | 1 | int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode) {
_cleanup_close_ int fd;
int r;
assert(path);
if (parents)
mkdir_parents(path, 0755);
fd = open(path, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY, mode > 0 ? mode : 0644... | 144,648,291,483,335,600,000,000,000,000,000,000,000 | fs-util.c | 25,832,733,540,396,505,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2016-10156 | A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229. | https://nvd.nist.gov/vuln/detail/CVE-2016-10156 |
160,457 | systemd | 06eeacb6fe029804f296b065b3ce91e796e1cd0e | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/06eeacb6fe029804f296b065b3ce91e796e1cd0e | basic: fix touch() creating files with 07777 mode
mode_t is unsigned, so MODE_INVALID < 0 can never be true.
This fixes a possible DoS where any user could fill /run by writing to
a world-writable /run/systemd/show-status. | 0 | int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode) {
_cleanup_close_ int fd;
int r;
assert(path);
if (parents)
mkdir_parents(path, 0755);
fd = open(path, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY,
... | 261,094,024,178,118,060,000,000,000,000,000,000,000 | fs-util.c | 50,325,332,525,198,760,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2016-10156 | A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229. | https://nvd.nist.gov/vuln/detail/CVE-2016-10156 |
3,107 | linux | 06deeec77a5a689cc94b21a8a91a76e42176685d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/06deeec77a5a689cc94b21a8a91a76e42176685d | cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack
smbencrypt() points a scatterlist to the stack, which is breaks if
CONFIG_VMAP_STACK=y.
Fix it by switching to crypto_cipher_encrypt_one(). The new code
should be considerably faster as an added benefit.
This code is nearly identical to some code th... | 1 | smbhash(unsigned char *out, const unsigned char *in, unsigned char *key)
{
int rc;
unsigned char key2[8];
struct crypto_skcipher *tfm_des;
struct scatterlist sgin, sgout;
struct skcipher_request *req;
str_to_key(key, key2);
tfm_des = crypto_alloc_skcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC);
if (IS_ERR(tf... | 257,379,465,516,682,100,000,000,000,000,000,000,000 | smbencrypt.c | 324,230,031,737,444,380,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10154 | The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page... | https://nvd.nist.gov/vuln/detail/CVE-2016-10154 |
160,458 | linux | 06deeec77a5a689cc94b21a8a91a76e42176685d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/06deeec77a5a689cc94b21a8a91a76e42176685d | cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack
smbencrypt() points a scatterlist to the stack, which is breaks if
CONFIG_VMAP_STACK=y.
Fix it by switching to crypto_cipher_encrypt_one(). The new code
should be considerably faster as an added benefit.
This code is nearly identical to some code th... | 0 | smbhash(unsigned char *out, const unsigned char *in, unsigned char *key)
{
unsigned char key2[8];
struct crypto_cipher *tfm_des;
str_to_key(key, key2);
tfm_des = crypto_alloc_cipher("des", 0, 0);
if (IS_ERR(tfm_des)) {
cifs_dbg(VFS, "could not allocate des crypto API\n");
return PTR_ERR(tfm_des);
}... | 296,440,717,411,516,900,000,000,000,000,000,000,000 | smbencrypt.c | 31,273,539,666,737,430,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10154 | The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page... | https://nvd.nist.gov/vuln/detail/CVE-2016-10154 |
3,114 | ImageMagick | 97566cf2806c0a5a86e884c96831a0c3b1ec6c20 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20 | None | 1 | static MagickBooleanType WriteIPLImage(const ImageInfo *image_info,Image *image)
{
ExceptionInfo
*exception;
IPLInfo
ipl_info;
MagickBooleanType
status;
MagickOffsetType
scene;
register const PixelPacket
*p;
QuantumInfo
*quantum_info;
ssize_t
y;
unsigned char
*pixe... | 168,604,460,062,043,490,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10144 | coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check. | https://nvd.nist.gov/vuln/detail/CVE-2016-10144 |
160,463 | ImageMagick | 97566cf2806c0a5a86e884c96831a0c3b1ec6c20 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20 | None | 0 | static MagickBooleanType WriteIPLImage(const ImageInfo *image_info,Image *image)
{
ExceptionInfo
*exception;
IPLInfo
ipl_info;
MagickBooleanType
status;
MagickOffsetType
scene;
register const PixelPacket
*p;
QuantumInfo
*quantum_info;
ssize_t
y;
unsigned char
*pixe... | 126,862,528,697,678,500,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10144 | coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check. | https://nvd.nist.gov/vuln/detail/CVE-2016-10144 |
3,115 | libgit2 | 9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 | http: check certificate validity before clobbering the error variable | 1 | static int http_connect(http_subtransport *t)
{
int error;
if (t->connected &&
http_should_keep_alive(&t->parser) &&
t->parse_finished)
return 0;
if (t->io) {
git_stream_close(t->io);
git_stream_free(t->io);
t->io = NULL;
t->connected = 0;
}
if (t->connection_data.use_ssl) {
error = git_tls_stre... | 196,554,667,555,384,750,000,000,000,000,000,000,000 | http.c | 262,511,896,804,073,250,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-10130 | The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-10130 |
160,464 | libgit2 | 9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 | http: check certificate validity before clobbering the error variable | 0 | static int http_connect(http_subtransport *t)
{
int error;
if (t->connected &&
http_should_keep_alive(&t->parser) &&
t->parse_finished)
return 0;
if (t->io) {
git_stream_close(t->io);
git_stream_free(t->io);
t->io = NULL;
t->connected = 0;
}
if (t->connection_data.use_ssl) {
error = git_tls_stre... | 332,711,528,143,510,100,000,000,000,000,000,000,000 | http.c | 132,296,802,371,283,950,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-10130 | The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-10130 |
3,120 | libtiff | c7153361a4041260719b340f73f2f76 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76 | * tools/tiff2pdf.c: avoid potential heap-based overflow in
t2p_readwrite_pdf_image_tile().
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640 | 1 | tsize_t t2p_readwrite_pdf_image_tile(T2P* t2p, TIFF* input, TIFF* output, ttile_t tile){
uint16 edge=0;
tsize_t written=0;
unsigned char* buffer=NULL;
tsize_t bufferoffset=0;
unsigned char* samplebuffer=NULL;
tsize_t samplebufferoffset=0;
tsize_t read=0;
uint16 i=0;
ttile_t tilecount=0;
/* tsize_t tilesize=0... | 189,588,000,909,003,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-10094 | Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2016-10094 |
160,467 | libtiff | c7153361a4041260719b340f73f2f76 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76 | * tools/tiff2pdf.c: avoid potential heap-based overflow in
t2p_readwrite_pdf_image_tile().
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640 | 0 | tsize_t t2p_readwrite_pdf_image_tile(T2P* t2p, TIFF* input, TIFF* output, ttile_t tile){
uint16 edge=0;
tsize_t written=0;
unsigned char* buffer=NULL;
tsize_t bufferoffset=0;
unsigned char* samplebuffer=NULL;
tsize_t samplebufferoffset=0;
tsize_t read=0;
uint16 i=0;
ttile_t tilecount=0;
/* tsize_t tilesize=0... | 42,551,173,115,675,010,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-10094 | Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2016-10094 |
3,124 | ImageMagick | b173a352397877775c51c9a0e9d59eb6ce24c455 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b173a352397877775c51c9a0e9d59eb6ce24c455 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 192,269,583,203,591,370,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10070 | Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10070 |
160,469 | ImageMagick | b173a352397877775c51c9a0e9d59eb6ce24c455 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b173a352397877775c51c9a0e9d59eb6ce24c455 | None | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 55,468,442,686,930,240,000,000,000,000,000,000,000 | mat.c | 192,634,289,003,886,670,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10070 | Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10070 |
3,125 | ImageMagick | 8a370f9ab120faf182aa160900ba692ba8e2bcf0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8a370f9ab120faf182aa160900ba692ba8e2bcf0 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 326,982,455,566,319,460,000,000,000,000,000,000,000 | mat.c | 137,745,844,689,009,620,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-10069 | coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames. | https://nvd.nist.gov/vuln/detail/CVE-2016-10069 |
160,470 | ImageMagick | 8a370f9ab120faf182aa160900ba692ba8e2bcf0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8a370f9ab120faf182aa160900ba692ba8e2bcf0 | None | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 88,145,809,021,505,630,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-10069 | coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames. | https://nvd.nist.gov/vuln/detail/CVE-2016-10069 |
3,126 | ImageMagick | 56d6e20de489113617cbbddaf41e92600a34db22 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22 | None | 1 | static void MSLStartElement(void *context,const xmlChar *tag,
const xmlChar **attributes)
{
AffineMatrix
affine,
current;
ChannelType
channel;
char
key[MaxTextExtent],
*value;
const char
*attribute,
*keyword;
double
angle;
DrawInfo
*draw_info;
ExceptionInfo
... | 109,071,652,637,853,450,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-10068 | The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10068 |
160,471 | ImageMagick | 56d6e20de489113617cbbddaf41e92600a34db22 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22 | None | 0 | static void MSLStartElement(void *context,const xmlChar *tag,
const xmlChar **attributes)
{
AffineMatrix
affine,
current;
ChannelType
channel;
char
key[MaxTextExtent],
*value;
const char
*attribute,
*keyword;
double
angle;
DrawInfo
*draw_info;
ExceptionInfo
... | 265,791,920,018,166,770,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-10068 | The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10068 |
3,128 | ImageMagick | 0474237508f39c4f783208123431815f1ededb76 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76 | None | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MA... | 87,441,195,499,598,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10067 | magick/memory.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via vectors involving "too many exceptions," which trigger a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-10067 |
160,473 | ImageMagick | 0474237508f39c4f783208123431815f1ededb76 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76 | None | 0 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MA... | 31,309,987,483,495,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10067 | magick/memory.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via vectors involving "too many exceptions," which trigger a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-10067 |
3,194 | ImageMagick | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | None | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 194,560,327,807,090,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10066 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10066 |
160,534 | ImageMagick | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | None | 0 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 61,645,540,667,684,990,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10066 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10066 |
3,200 | ImageMagick | f8877abac8e568b2f339cca70c2c3c1b6eaec288 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f8877abac8e568b2f339cca70c2c3c1b6eaec288 | None | 1 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 58,632,908,984,196,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10064 | Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10064 |
160,539 | ImageMagick | f8877abac8e568b2f339cca70c2c3c1b6eaec288 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f8877abac8e568b2f339cca70c2c3c1b6eaec288 | None | 0 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 16,759,274,679,753,153,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10064 | Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10064 |
3,203 | ImageMagick | 933e96f01a8c889c7bf5ffd30020e86a02a046e7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/933e96f01a8c889c7bf5ffd30020e86a02a046e7 | https://github.com/ImageMagick/ImageMagick/issues/196 | 1 | static MagickBooleanType ConcatenateImages(int argc,char **argv,
ExceptionInfo *exception )
{
FILE
*input,
*output;
int
c;
register ssize_t
i;
if (ExpandFilenames(&argc,&argv) == MagickFalse)
ThrowFileException(exception,ResourceLimitError,"MemoryAllocationFailed",
... | 20,999,313,557,570,732,000,000,000,000,000,000,000 | magick-cli.c | 12,808,080,539,331,031,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-10060 | The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10060 |
160,540 | ImageMagick | 933e96f01a8c889c7bf5ffd30020e86a02a046e7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/933e96f01a8c889c7bf5ffd30020e86a02a046e7 | https://github.com/ImageMagick/ImageMagick/issues/196 | 0 | static MagickBooleanType ConcatenateImages(int argc,char **argv,
ExceptionInfo *exception )
{
FILE
*input,
*output;
MagickBooleanType
status;
int
c;
register ssize_t
i;
if (ExpandFilenames(&argc,&argv) == MagickFalse)
ThrowFileException(exception,ResourceLimitError,"M... | 81,059,994,454,607,910,000,000,000,000,000,000,000 | magick-cli.c | 31,118,888,895,649,180,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-10060 | The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10060 |
9,511 | ImageMagick | 10b3823a7619ed22d42764733eb052c4159bc8c1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 | None | 1 | MagickBooleanType sixel_decode(unsigned char /* in */ *p, /* sixel bytes */
unsigned char /* out */ **pixels, /* decoded pixels */
size_t /* out */ *pwidth, /* image width */
... | 35,991,042,325,313,126,000,000,000,000,000,000,000 | sixel.c | 213,717,042,796,677,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10054 | Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10054 |
184,596 | ImageMagick | 10b3823a7619ed22d42764733eb052c4159bc8c1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 | None | 0 | MagickBooleanType sixel_decode(unsigned char /* in */ *p, /* sixel bytes */
unsigned char /* out */ **pixels, /* decoded pixels */
size_t /* out */ *pwidth, /* image width */
... | 185,708,913,973,440,460,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10054 | Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10054 |
3,211 | ImageMagick | f983dcdf9c178e0cbc49608a78713c5669aa1bb5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f983dcdf9c178e0cbc49608a78713c5669aa1bb5 | None | 1 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
#if !defined(TIFFDefaultStripSize)
#define TIFFDefaultStripSize(tiff,request) (8192UL/TIFFScanlineSize(tiff))
#endif
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickB... | 142,572,469,438,655,880,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-10053 | The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10053 |
160,543 | ImageMagick | f983dcdf9c178e0cbc49608a78713c5669aa1bb5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f983dcdf9c178e0cbc49608a78713c5669aa1bb5 | None | 0 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
#if !defined(TIFFDefaultStripSize)
#define TIFFDefaultStripSize(tiff,request) (8192UL/TIFFScanlineSize(tiff))
#endif
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickB... | 44,616,049,784,015,430,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-10053 | The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10053 |
3,212 | ImageMagick | ecc03a2518c2b7dd375fde3a040fdae0bdf6a521 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521 | None | 1 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
register ssize_t
i;
size_t
files... | 35,362,358,607,063,336,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-10051 | Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10051 |
160,544 | ImageMagick | ecc03a2518c2b7dd375fde3a040fdae0bdf6a521 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521 | None | 0 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
register ssize_t
i;
size_t
files... | 22,718,158,323,206,855,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-10051 | Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10051 |
3,213 | ImageMagick | 73fb0aac5b958521e1511e179ecc0ad49f70ebaf | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73fb0aac5b958521e1511e179ecc0ad49f70ebaf | None | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
IndexPacket
index;
int
opcode,
... | 75,140,968,535,640,320,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10050 | Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10050 |
160,545 | ImageMagick | 73fb0aac5b958521e1511e179ecc0ad49f70ebaf | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73fb0aac5b958521e1511e179ecc0ad49f70ebaf | None | 0 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
IndexPacket
index;
int
opcode,
... | 312,064,195,008,050,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10050 | Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10050 |
3,216 | ImageMagick | fc6080f1321fd21e86ef916195cc110b05d9effb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb | None | 1 | MagickExport XMLTreeInfo *NewXMLTree(const char *xml,ExceptionInfo *exception)
{
char
**attribute,
**attributes,
*tag,
*utf8;
int
c,
terminal;
MagickBooleanType
status;
register char
*p;
register ssize_t
i;
size_t
ignore_depth,
length;
ssize_t
j,
l... | 132,413,851,071,805,780,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2016-10048 | Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-10048 |
160,547 | ImageMagick | fc6080f1321fd21e86ef916195cc110b05d9effb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb | None | 0 | MagickExport XMLTreeInfo *NewXMLTree(const char *xml,ExceptionInfo *exception)
{
char
**attribute,
**attributes,
*tag,
*utf8;
int
c,
terminal;
MagickBooleanType
status;
register char
*p;
register ssize_t
i;
size_t
ignore_depth,
length;
ssize_t
j,
l... | 40,850,238,976,111,830,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2016-10048 | Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-10048 |
3,217 | ImageMagick | 989f9f88ea6db09b99d25586e912c921c0da8d3f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/989f9f88ea6db09b99d25586e912c921c0da8d3f | None | 1 | MagickExport MagickBooleanType DrawImage(Image *image,const DrawInfo *draw_info)
{
#define RenderImageTag "Render/Image"
AffineMatrix
affine,
current;
char
key[2*MaxTextExtent],
keyword[MaxTextExtent],
geometry[MaxTextExtent],
name[MaxTextExtent],
*next_token,
pattern[MaxTextExten... | 274,761,832,932,917,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10046 | Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10046 |
160,548 | ImageMagick | 989f9f88ea6db09b99d25586e912c921c0da8d3f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/989f9f88ea6db09b99d25586e912c921c0da8d3f | None | 0 | MagickExport MagickBooleanType DrawImage(Image *image,const DrawInfo *draw_info)
{
#define RenderImageTag "Render/Image"
AffineMatrix
affine,
current;
char
key[2*MaxTextExtent],
keyword[MaxTextExtent],
geometry[MaxTextExtent],
name[MaxTextExtent],
*next_token,
pattern[MaxTextExten... | 205,802,462,639,444,260,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10046 | Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10046 |
3,218 | linux | 22f6b4d34fcf039c63a94e7670e0da24f8575a5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a | aio: mark AIO pseudo-fs noexec
This ensures that do_mmap() won't implicitly make AIO memory mappings
executable if the READ_IMPLIES_EXEC personality flag is set. Such
behavior is problematic because the security_mmap_file LSM hook doesn't
catch this case, potentially permitting an attacker to bypass a W^X
policy enfo... | 1 | static struct dentry *aio_mount(struct file_system_type *fs_type,
int flags, const char *dev_name, void *data)
{
static const struct dentry_operations ops = {
.d_dname = simple_dname,
};
return mount_pseudo(fs_type, "aio:", NULL, &ops, AIO_RING_MAGIC);
}
| 306,823,533,012,731,260,000,000,000,000,000,000,000 | aio.c | 237,696,531,853,282,900,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2016-10044 | The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10044 |
160,549 | linux | 22f6b4d34fcf039c63a94e7670e0da24f8575a5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a | aio: mark AIO pseudo-fs noexec
This ensures that do_mmap() won't implicitly make AIO memory mappings
executable if the READ_IMPLIES_EXEC personality flag is set. Such
behavior is problematic because the security_mmap_file LSM hook doesn't
catch this case, potentially permitting an attacker to bypass a W^X
policy enfo... | 0 | static struct dentry *aio_mount(struct file_system_type *fs_type,
int flags, const char *dev_name, void *data)
{
static const struct dentry_operations ops = {
.d_dname = simple_dname,
};
struct dentry *root = mount_pseudo(fs_type, "aio:", NULL, &ops,
AIO_RING_MAGIC);
if (!IS_ERR(root))
root->d_s... | 236,695,779,613,560,750,000,000,000,000,000,000,000 | aio.c | 30,486,927,269,978,305,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2016-10044 | The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10044 |
3,219 | slurm | 92362a92fffe60187df61f99ab11c249d44120ee | https://github.com/SchedMD/slurm | https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee | Fix security issue in _prolog_error().
Fix security issue caused by insecure file path handling triggered by
the failure of a Prolog script. To exploit this a user needs to
anticipate or cause the Prolog to fail for their job.
(This commit is slightly different from the fix to the 15.08 branch.)
CVE-2016-10030. | 1 | _prolog_error(batch_job_launch_msg_t *req, int rc)
{
char *err_name_ptr, err_name[256], path_name[MAXPATHLEN];
char *fmt_char;
int fd;
if (req->std_err || req->std_out) {
if (req->std_err)
strncpy(err_name, req->std_err, sizeof(err_name));
else
strncpy(err_name, req->std_out, sizeof(err_name));
if ((... | 132,874,965,140,059,950,000,000,000,000,000,000,000 | req.c | 4,641,462,002,959,163,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-10030 | The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploit... | https://nvd.nist.gov/vuln/detail/CVE-2016-10030 |
160,550 | slurm | 92362a92fffe60187df61f99ab11c249d44120ee | https://github.com/SchedMD/slurm | https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee | Fix security issue in _prolog_error().
Fix security issue caused by insecure file path handling triggered by
the failure of a Prolog script. To exploit this a user needs to
anticipate or cause the Prolog to fail for their job.
(This commit is slightly different from the fix to the 15.08 branch.)
CVE-2016-10030. | 0 | _prolog_error(batch_job_launch_msg_t *req, int rc)
{
char *err_name_ptr, err_name[256], path_name[MAXPATHLEN];
char *fmt_char;
int fd;
if (req->std_err || req->std_out) {
if (req->std_err)
strncpy(err_name, req->std_err, sizeof(err_name));
else
strncpy(err_name, req->std_out, sizeof(err_name));
if ((... | 71,971,412,709,540,050,000,000,000,000,000,000,000 | req.c | 289,813,073,730,615,900,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-10030 | The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploit... | https://nvd.nist.gov/vuln/detail/CVE-2016-10030 |
3,231 | src | ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 | use sshbuf_allocate() to pre-allocate the buffer used for loading
keys. This avoids implicit realloc inside the buffer code, which
might theoretically leave fragments of the key on the heap. This
doesn't appear to happen in practice for normal sized keys, but
was observed for novelty oversize ones.
Pointed out by Jann... | 1 | sshkey_load_file(int fd, struct sshbuf *blob)
{
u_char buf[1024];
size_t len;
struct stat st;
int r;
if (fstat(fd, &st) < 0)
return SSH_ERR_SYSTEM_ERROR;
if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 &&
st.st_size > MAX_KEY_FILE_SIZE)
return SSH_ERR_INVALID_FORMAT;
for (;;) {
if ((len... | 87,271,877,278,747,050,000,000,000,000,000,000,000 | authfile.c | 264,566,486,326,241,450,000,000,000,000,000,000,000 | [
"CWE-320"
] | CVE-2016-10011 | authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process. | https://nvd.nist.gov/vuln/detail/CVE-2016-10011 |
160,562 | src | ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 | use sshbuf_allocate() to pre-allocate the buffer used for loading
keys. This avoids implicit realloc inside the buffer code, which
might theoretically leave fragments of the key on the heap. This
doesn't appear to happen in practice for normal sized keys, but
was observed for novelty oversize ones.
Pointed out by Jann... | 0 | sshkey_load_file(int fd, struct sshbuf *blob)
{
u_char buf[1024];
size_t len;
struct stat st;
int r, dontmax = 0;
if (fstat(fd, &st) < 0)
return SSH_ERR_SYSTEM_ERROR;
if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 &&
st.st_size > MAX_KEY_FILE_SIZE)
return SSH_ERR_INVALID_FORMAT;
/*
* Pre... | 51,275,164,127,480,610,000,000,000,000,000,000,000 | authfile.c | 298,555,526,736,213,000,000,000,000,000,000,000,000 | [
"CWE-320"
] | CVE-2016-10011 | authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process. | https://nvd.nist.gov/vuln/detail/CVE-2016-10011 |
3,236 | php-src | b2af4e8868726a040234de113436c6e4f6372d17 | https://github.com/php/php-src | https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17 | Complete the fix of bug #70172 for PHP 7 | 1 | PHP_FUNCTION(unserialize)
{
char *buf = NULL;
size_t buf_len;
const unsigned char *p;
php_unserialize_data_t var_hash;
zval *options = NULL, *classes = NULL;
HashTable *class_hash = NULL;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|a", &buf, &buf_len, &options) == FAILURE) {
RETURN_FALSE;
}
if (buf... | 3,385,748,056,525,523,300,000,000,000,000,000,000 | var.c | 176,599,822,315,762,470,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-9936 | The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834. | https://nvd.nist.gov/vuln/detail/CVE-2016-9936 |
160,567 | php-src | b2af4e8868726a040234de113436c6e4f6372d17 | https://github.com/php/php-src | https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17 | Complete the fix of bug #70172 for PHP 7 | 0 | PHP_FUNCTION(unserialize)
{
char *buf = NULL;
size_t buf_len;
const unsigned char *p;
php_unserialize_data_t var_hash;
zval *options = NULL, *classes = NULL;
zval *retval;
HashTable *class_hash = NULL;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|a", &buf, &buf_len, &options) == FAILURE) {
RETURN_FALS... | 111,385,059,885,427,450,000,000,000,000,000,000,000 | var.c | 68,852,769,275,369,730,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-9936 | The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834. | https://nvd.nist.gov/vuln/detail/CVE-2016-9936 |
3,237 | php-src | 66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 | https://github.com/php/php-src | https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 | Fix bug #73631 - Invalid read when wddx decodes empty boolean element | 1 | static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts)
{
st_entry ent;
wddx_stack *stack = (wddx_stack *)user_data;
if (!strcmp(name, EL_PACKET)) {
int i;
if (atts) for (i=0; atts[i]; i++) {
if (!strcmp(atts[i], EL_VERSION)) {
/* nothing for now */
}
}
} el... | 47,837,849,909,634,070,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-9935 | The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-9935 |
160,568 | php-src | 66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 | https://github.com/php/php-src | https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 | Fix bug #73631 - Invalid read when wddx decodes empty boolean element | 0 | static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts)
{
st_entry ent;
wddx_stack *stack = (wddx_stack *)user_data;
if (!strcmp(name, EL_PACKET)) {
int i;
if (atts) for (i=0; atts[i]; i++) {
if (!strcmp(atts[i], EL_VERSION)) {
/* nothing for now */
}
}
} el... | 332,744,513,181,436,100,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-9935 | The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-9935 |
3,241 | zlib | d1d577490c15a0c6862473d7576352a9f18ef811 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811 | Avoid pre-decrement of pointer in big-endian CRC calculation.
There was a small optimization for PowerPCs to pre-increment a
pointer when accessing a word, instead of post-incrementing. This
required prefacing the loop with a decrement of the pointer,
possibly pointing before the object passed. This is not compliant
w... | 1 | local unsigned long crc32_big(crc, buf, len)
unsigned long crc;
const unsigned char FAR *buf;
unsigned len;
{
register z_crc_t c;
register const z_crc_t FAR *buf4;
c = ZSWAP32((z_crc_t)crc);
c = ~c;
while (len && ((ptrdiff_t)buf & 3)) {
c = crc_table[4][(c >> 24) ^ *buf++] ^ (c ... | 72,455,579,918,499,885,000,000,000,000,000,000,000 | crc32.c | 219,879,363,491,041,870,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9843 | The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. | https://nvd.nist.gov/vuln/detail/CVE-2016-9843 |
160,572 | zlib | d1d577490c15a0c6862473d7576352a9f18ef811 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811 | Avoid pre-decrement of pointer in big-endian CRC calculation.
There was a small optimization for PowerPCs to pre-increment a
pointer when accessing a word, instead of post-incrementing. This
required prefacing the loop with a decrement of the pointer,
possibly pointing before the object passed. This is not compliant
w... | 0 | local unsigned long crc32_big(crc, buf, len)
unsigned long crc;
const unsigned char FAR *buf;
unsigned len;
{
register z_crc_t c;
register const z_crc_t FAR *buf4;
c = ZSWAP32((z_crc_t)crc);
c = ~c;
while (len && ((ptrdiff_t)buf & 3)) {
c = crc_table[4][(c >> 24) ^ *buf++] ^ (c ... | 256,731,203,865,202,000,000,000,000,000,000,000,000 | crc32.c | 233,003,446,608,341,800,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9843 | The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. | https://nvd.nist.gov/vuln/detail/CVE-2016-9843 |
3,242 | zlib | e54e1299404101a5a9d0cf5e45512b543967f958 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958 | Avoid shifts of negative values inflateMark().
The C standard says that bit shifts of negative integers is
undefined. This casts to unsigned values to assure a known
result. | 1 | long ZEXPORT inflateMark(strm)
z_streamp strm;
{
struct inflate_state FAR *state;
if (strm == Z_NULL || strm->state == Z_NULL) return -1L << 16;
state = (struct inflate_state FAR *)strm->state;
return ((long)(state->back) << 16) +
(state->mode == COPY ? state->length :
(state-... | 225,690,671,182,833,500,000,000,000,000,000,000,000 | inflate.c | 143,972,972,253,035,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9842 | The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers. | https://nvd.nist.gov/vuln/detail/CVE-2016-9842 |
160,573 | zlib | e54e1299404101a5a9d0cf5e45512b543967f958 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958 | Avoid shifts of negative values inflateMark().
The C standard says that bit shifts of negative integers is
undefined. This casts to unsigned values to assure a known
result. | 0 | long ZEXPORT inflateMark(strm)
z_streamp strm;
{
struct inflate_state FAR *state;
if (strm == Z_NULL || strm->state == Z_NULL)
return (long)(((unsigned long)0 - 1) << 16);
state = (struct inflate_state FAR *)strm->state;
return (long)(((unsigned long)((long)state->back)) << 16) +
(... | 277,856,133,545,947,660,000,000,000,000,000,000,000 | inflate.c | 118,291,032,335,358,850,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9842 | The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers. | https://nvd.nist.gov/vuln/detail/CVE-2016-9842 |
3,243 | zlib | 9aaec95e82117c1cb0f9624264c3618fc380cecb | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb | Use post-increment only in inffast.c.
An old inffast.c optimization turns out to not be optimal anymore
with modern compilers, and furthermore was not compliant with the
C standard, for which decrementing a pointer before its allocated
memory is undefined. Per the recommendation of a security audit of
the zlib code by... | 1 | void ZLIB_INTERNAL inflate_fast(strm, start)
z_streamp strm;
unsigned start; /* inflate()'s starting value for strm->avail_out */
{
struct inflate_state FAR *state;
z_const unsigned char FAR *in; /* local strm->next_in */
z_const unsigned char FAR *last; /* have enough input while in < last ... | 180,070,009,003,744,170,000,000,000,000,000,000,000 | inffast.c | 141,923,369,108,859,480,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9841 | inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | https://nvd.nist.gov/vuln/detail/CVE-2016-9841 |
160,574 | zlib | 9aaec95e82117c1cb0f9624264c3618fc380cecb | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb | Use post-increment only in inffast.c.
An old inffast.c optimization turns out to not be optimal anymore
with modern compilers, and furthermore was not compliant with the
C standard, for which decrementing a pointer before its allocated
memory is undefined. Per the recommendation of a security audit of
the zlib code by... | 0 | void ZLIB_INTERNAL inflate_fast(strm, start)
z_streamp strm;
unsigned start; /* inflate()'s starting value for strm->avail_out */
{
struct inflate_state FAR *state;
z_const unsigned char FAR *in; /* local strm->next_in */
z_const unsigned char FAR *last; /* have enough input while in < last ... | 21,320,107,842,417,320,000,000,000,000,000,000,000 | inffast.c | 318,535,073,282,265,160,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9841 | inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | https://nvd.nist.gov/vuln/detail/CVE-2016-9841 |
3,244 | zlib | 6a043145ca6e9c55184013841a67b2fef87e44c0 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0 | Remove offset pointer optimization in inftrees.c.
inftrees.c was subtracting an offset from a pointer to an array,
in order to provide a pointer that allowed indexing starting at
the offset. This is not compliant with the C standard, for which
the behavior of a pointer decremented before its allocated memory
is undefi... | 1 | int ZLIB_INTERNAL inflate_table(type, lens, codes, table, bits, work)
codetype type;
unsigned short FAR *lens;
unsigned codes;
code FAR * FAR *table;
unsigned FAR *bits;
unsigned short FAR *work;
{
unsigned len; /* a code's length in bits */
unsigned sym; /* index of code symbols */
... | 267,171,999,140,286,600,000,000,000,000,000,000,000 | inftrees.c | 83,840,119,816,087,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9840 | inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | https://nvd.nist.gov/vuln/detail/CVE-2016-9840 |
160,575 | zlib | 6a043145ca6e9c55184013841a67b2fef87e44c0 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0 | Remove offset pointer optimization in inftrees.c.
inftrees.c was subtracting an offset from a pointer to an array,
in order to provide a pointer that allowed indexing starting at
the offset. This is not compliant with the C standard, for which
the behavior of a pointer decremented before its allocated memory
is undefi... | 0 | int ZLIB_INTERNAL inflate_table(type, lens, codes, table, bits, work)
codetype type;
unsigned short FAR *lens;
unsigned codes;
code FAR * FAR *table;
unsigned FAR *bits;
unsigned short FAR *work;
{
unsigned len; /* a code's length in bits */
unsigned sym; /* index of code symbols */
... | 289,193,798,494,554,870,000,000,000,000,000,000,000 | inftrees.c | 100,230,909,780,333,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9840 | inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | https://nvd.nist.gov/vuln/detail/CVE-2016-9840 |
3,274 | jasper | d42b2388f7f8e0332c846675133acea151fc557a | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a | The generation of the configuration file jas_config.h has been completely
reworked in order to avoid pollution of the global namespace.
Some problematic types like uchar, ulong, and friends have been replaced
with names with a jas_ prefix.
An option max_samples has been added to the BMP and JPEG decoders to
restrict ... | 1 | jas_matrix_t *jas_seq2d_create(int xstart, int ystart, int xend, int yend)
{
jas_matrix_t *matrix;
assert(xstart <= xend && ystart <= yend);
if (!(matrix = jas_matrix_create(yend - ystart, xend - xstart))) {
return 0;
}
matrix->xstart_ = xstart;
matrix->ystart_ = ystart;
matrix->xend_ = xend;
matrix->yend_... | 47,377,460,787,985,390,000,000,000,000,000,000,000 | jas_seq.c | 231,791,317,884,716,800,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2015-5203 | Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5203 |
160,602 | jasper | d42b2388f7f8e0332c846675133acea151fc557a | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a | The generation of the configuration file jas_config.h has been completely
reworked in order to avoid pollution of the global namespace.
Some problematic types like uchar, ulong, and friends have been replaced
with names with a jas_ prefix.
An option max_samples has been added to the BMP and JPEG decoders to
restrict ... | 0 | jas_matrix_t *jas_seq2d_create(int xstart, int ystart, int xend, int yend)
jas_matrix_t *jas_seq2d_create(jas_matind_t xstart, jas_matind_t ystart,
jas_matind_t xend, jas_matind_t yend)
{
jas_matrix_t *matrix;
assert(xstart <= xend && ystart <= yend);
if (!(matrix = jas_matrix_create(yend - ystart, xend - xstar... | 68,495,942,184,844,730,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2015-5203 | Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5203 |
3,294 | ImageMagick | ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99 | https://github.com/ImageMagick/ImageMagick/issues/301 | 1 | static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
register Quantum
*q;
register ssize_t
i,
x;
register unsigned char
*p;
SGIInfo
iris_... | 30,401,003,998,596,426,000,000,000,000,000,000,000 | sgi.c | 50,673,686,952,176,880,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9556 | The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-9556 |
160,620 | ImageMagick | ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99 | https://github.com/ImageMagick/ImageMagick/issues/301 | 0 | static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
register Quantum
*q;
register ssize_t
i,
x;
register unsigned char
*p;
SGIInfo
iris_... | 54,638,996,650,743,890,000,000,000,000,000,000,000 | sgi.c | 123,836,635,326,396,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9556 | The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-9556 |
3,296 | jasper | 1e84674d95353c64e5c4c0e7232ae86fd6ea813b | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/1e84674d95353c64e5c4c0e7232ae86fd6ea813b | Changed the JPC bitstream code to more gracefully handle a request
for a larger sized integer than what can be handled (i.e., return
with an error instead of failing an assert). | 1 | long jpc_bitstream_getbits(jpc_bitstream_t *bitstream, int n)
{
long v;
int u;
/* We can reliably get at most 31 bits since ISO/IEC 9899 only
guarantees that a long can represent values up to 2^31-1. */
assert(n >= 0 && n < 32);
/* Get the number of bits requested from the specified bit stream. */
v = ... | 299,025,905,055,741,460,000,000,000,000,000,000,000 | jpc_bs.c | 84,360,022,075,198,790,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-9391 | The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer. | https://nvd.nist.gov/vuln/detail/CVE-2016-9391 |
160,621 | jasper | 1e84674d95353c64e5c4c0e7232ae86fd6ea813b | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/1e84674d95353c64e5c4c0e7232ae86fd6ea813b | Changed the JPC bitstream code to more gracefully handle a request
for a larger sized integer than what can be handled (i.e., return
with an error instead of failing an assert). | 0 | long jpc_bitstream_getbits(jpc_bitstream_t *bitstream, int n)
{
long v;
int u;
/* We can reliably get at most 31 bits since ISO/IEC 9899 only
guarantees that a long can represent values up to 2^31-1. */
//assert(n >= 0 && n < 32);
if (n < 0 || n >= 32) {
return -1;
}
/* Get the number of bits request... | 339,357,650,229,848,260,000,000,000,000,000,000,000 | jpc_bs.c | 138,673,695,644,118,760,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-9391 | The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer. | https://nvd.nist.gov/vuln/detail/CVE-2016-9391 |
3,300 | jasper | dee11ec440d7908d1daf69f40a3324b27cf213ba | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba | The component domains must be the same for the ICT/RCT in the JPC codec.
This was previously enforced with an assertion.
Now, it is handled in a more graceful manner. | 1 | static int jpc_dec_tiledecode(jpc_dec_t *dec, jpc_dec_tile_t *tile)
{
int i;
int j;
jpc_dec_tcomp_t *tcomp;
jpc_dec_rlvl_t *rlvl;
jpc_dec_band_t *band;
int compno;
int rlvlno;
int bandno;
int adjust;
int v;
jpc_dec_ccp_t *ccp;
jpc_dec_cmpt_t *cmpt;
if (jpc_dec_decodecblks(dec, tile)) {
jas_eprintf("jpc_... | 81,323,985,259,108,210,000,000,000,000,000,000,000 | jpc_dec.c | 304,708,091,272,308,030,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-9389 | The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure). | https://nvd.nist.gov/vuln/detail/CVE-2016-9389 |
160,624 | jasper | dee11ec440d7908d1daf69f40a3324b27cf213ba | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba | The component domains must be the same for the ICT/RCT in the JPC codec.
This was previously enforced with an assertion.
Now, it is handled in a more graceful manner. | 0 | static int jpc_dec_tiledecode(jpc_dec_t *dec, jpc_dec_tile_t *tile)
{
int i;
int j;
jpc_dec_tcomp_t *tcomp;
jpc_dec_rlvl_t *rlvl;
jpc_dec_band_t *band;
int compno;
int rlvlno;
int bandno;
int adjust;
int v;
jpc_dec_ccp_t *ccp;
jpc_dec_cmpt_t *cmpt;
if (jpc_dec_decodecblks(dec, tile)) {
jas_eprintf("jpc_... | 213,736,832,455,554,340,000,000,000,000,000,000,000 | jpc_dec.c | 9,904,405,345,613,609,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-9389 | The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure). | https://nvd.nist.gov/vuln/detail/CVE-2016-9389 |
3,311 | jasper | 634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 | Made some changes to the I/O stream library for memory streams.
There were a number of potential problems due to the possibility
of integer overflow.
Changed some integral types to the larger types size_t or ssize_t.
For example, the function mem_resize now takes the buffer size parameter
as a size_t.
Added a new funct... | 1 | static int mem_resize(jas_stream_memobj_t *m, int bufsize)
{
unsigned char *buf;
assert(bufsize >= 0);
JAS_DBGLOG(100, ("mem_resize(%p, %d)\n", m, bufsize));
if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char))) &&
bufsize) {
JAS_DBGLOG(100, ("mem_resize realloc failed\n"));
return -1;
... | 66,639,206,046,311,920,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2015-5203 | Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5203 |
160,630 | jasper | 634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 | Made some changes to the I/O stream library for memory streams.
There were a number of potential problems due to the possibility
of integer overflow.
Changed some integral types to the larger types size_t or ssize_t.
For example, the function mem_resize now takes the buffer size parameter
as a size_t.
Added a new funct... | 0 | static int mem_resize(jas_stream_memobj_t *m, int bufsize)
static int mem_resize(jas_stream_memobj_t *m, size_t bufsize)
{
unsigned char *buf;
//assert(bufsize >= 0);
JAS_DBGLOG(100, ("mem_resize(%p, %zu)\n", m, bufsize));
if (!bufsize) {
jas_eprintf(
"mem_resize was not really designed to handle a buffe... | 195,268,361,693,725,960,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2015-5203 | Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5203 |
3,314 | jasper | e24bdc716c3327b067c551bc6cfb97fd2370358d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d | Fixed a bug that resulted in the destruction of JP2 box data that had never
been constructed in the first place. | 1 | jp2_box_t *jp2_box_get(jas_stream_t *in)
{
jp2_box_t *box;
jp2_boxinfo_t *boxinfo;
jas_stream_t *tmpstream;
uint_fast32_t len;
uint_fast64_t extlen;
bool dataflag;
box = 0;
tmpstream = 0;
if (!(box = jas_malloc(sizeof(jp2_box_t)))) {
goto error;
}
box->ops = &jp2_boxinfo_unk.ops;
if (jp2_getuint32(in, &... | 269,241,090,374,988,640,000,000,000,000,000,000,000 | jp2_cod.c | 7,434,947,174,323,374,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8887 | The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference). | https://nvd.nist.gov/vuln/detail/CVE-2016-8887 |
160,632 | jasper | e24bdc716c3327b067c551bc6cfb97fd2370358d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d | Fixed a bug that resulted in the destruction of JP2 box data that had never
been constructed in the first place. | 0 | jp2_box_t *jp2_box_get(jas_stream_t *in)
{
jp2_box_t *box;
jp2_boxinfo_t *boxinfo;
jas_stream_t *tmpstream;
uint_fast32_t len;
uint_fast64_t extlen;
bool dataflag;
box = 0;
tmpstream = 0;
if (!(box = jas_malloc(sizeof(jp2_box_t)))) {
goto error;
}
box->ops = &jp2_boxinfo_unk.ops;
if (jp2_getuint32(in, &... | 247,824,527,682,006,600,000,000,000,000,000,000,000 | jp2_cod.c | 250,067,815,251,904,760,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8887 | The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference). | https://nvd.nist.gov/vuln/detail/CVE-2016-8887 |
3,317 | jasper | 5d66894d2313e3f3469f19066e149e08ff076698 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/5d66894d2313e3f3469f19066e149e08ff076698 | Fixed a problem with a null pointer dereference in the BMP decoder. | 1 | jas_image_t *bmp_decode(jas_stream_t *in, char *optstr)
{
jas_image_t *image;
bmp_hdr_t hdr;
bmp_info_t *info;
uint_fast16_t cmptno;
jas_image_cmptparm_t cmptparms[3];
jas_image_cmptparm_t *cmptparm;
uint_fast16_t numcmpts;
long n;
if (optstr) {
jas_eprintf("warning: ignoring BMP decoder options\n");
... | 228,936,594,935,256,760,000,000,000,000,000,000,000 | bmp_dec.c | 45,366,044,036,465,890,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8690 | The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8690 |
160,633 | jasper | 5d66894d2313e3f3469f19066e149e08ff076698 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/5d66894d2313e3f3469f19066e149e08ff076698 | Fixed a problem with a null pointer dereference in the BMP decoder. | 0 | jas_image_t *bmp_decode(jas_stream_t *in, char *optstr)
{
jas_image_t *image;
bmp_hdr_t hdr;
bmp_info_t *info;
uint_fast16_t cmptno;
jas_image_cmptparm_t cmptparms[3];
jas_image_cmptparm_t *cmptparm;
uint_fast16_t numcmpts;
long n;
image = 0;
info = 0;
if (optstr) {
jas_eprintf("warning: ignoring BM... | 276,728,953,916,609,440,000,000,000,000,000,000,000 | bmp_dec.c | 118,114,575,294,326,840,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8690 | The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8690 |
3,320 | jasper | 44a524e367597af58d6265ae2014468b334d0309 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/44a524e367597af58d6265ae2014468b334d0309 | The memory stream interface allows for a buffer size of zero.
The case of a zero-sized buffer was not handled correctly, as it could
lead to a double free.
This problem has now been fixed (hopefully).
One might ask whether a zero-sized buffer should be allowed at all,
but this is a question for another day. | 1 | static int mem_resize(jas_stream_memobj_t *m, int bufsize)
{
unsigned char *buf;
assert(m->buf_);
assert(bufsize >= 0);
if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char)))) {
return -1;
}
m->buf_ = buf;
m->bufsize_ = bufsize;
return 0;
}
| 24,603,643,167,309,006,000,000,000,000,000,000,000 | jas_stream.c | 131,633,196,601,018,700,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2016-8693 | Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8693 |
160,636 | jasper | 44a524e367597af58d6265ae2014468b334d0309 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/44a524e367597af58d6265ae2014468b334d0309 | The memory stream interface allows for a buffer size of zero.
The case of a zero-sized buffer was not handled correctly, as it could
lead to a double free.
This problem has now been fixed (hopefully).
One might ask whether a zero-sized buffer should be allowed at all,
but this is a question for another day. | 0 | static int mem_resize(jas_stream_memobj_t *m, int bufsize)
{
unsigned char *buf;
//assert(m->buf_);
assert(bufsize >= 0);
if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char))) &&
bufsize) {
return -1;
}
m->buf_ = buf;
m->bufsize_ = bufsize;
return 0;
}
| 186,309,944,528,178,670,000,000,000,000,000,000,000 | jas_stream.c | 92,937,582,461,512,620,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2016-8693 | Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8693 |
3,324 | libarchive | 7f17c791dcfd8c0416e2cd2485b19410e47ef126 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126 | Issue 761: Heap overflow reading corrupted 7Zip files
The sample file that demonstrated this had multiple 'EmptyStream'
attributes. The first one ended up being used to calculate
certain statistics, then was overwritten by the second which
was incompatible with those statistics.
The fix here is to reject any header... | 1 | read_Header(struct archive_read *a, struct _7z_header_info *h,
int check_header_id)
{
struct _7zip *zip = (struct _7zip *)a->format->data;
const unsigned char *p;
struct _7z_folder *folders;
struct _7z_stream_info *si = &(zip->si);
struct _7zip_entry *entries;
uint32_t folderIndex, indexInFolder;
unsigned i;... | 275,704,645,812,219,200,000,000,000,000,000,000,000 | archive_read_support_format_7zip.c | 1,218,370,420,990,421,900,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-8689 | The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-8689 |
160,638 | libarchive | 7f17c791dcfd8c0416e2cd2485b19410e47ef126 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126 | Issue 761: Heap overflow reading corrupted 7Zip files
The sample file that demonstrated this had multiple 'EmptyStream'
attributes. The first one ended up being used to calculate
certain statistics, then was overwritten by the second which
was incompatible with those statistics.
The fix here is to reject any header... | 0 | read_Header(struct archive_read *a, struct _7z_header_info *h,
int check_header_id)
{
struct _7zip *zip = (struct _7zip *)a->format->data;
const unsigned char *p;
struct _7z_folder *folders;
struct _7z_stream_info *si = &(zip->si);
struct _7zip_entry *entries;
uint32_t folderIndex, indexInFolder;
unsigned i;... | 260,010,128,138,353,430,000,000,000,000,000,000,000 | archive_read_support_format_7zip.c | 286,626,011,473,088,330,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-8689 | The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-8689 |
3,325 | libarchive | e37b620fe8f14535d737e89a4dcabaed4517bf1a | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a | Issue #767: Buffer overflow printing a filename
The safe_fprintf function attempts to ensure clean output for an
arbitrary sequence of bytes by doing a trial conversion of the
multibyte characters to wide characters -- if the resulting wide
character is printable then we pass through the corresponding bytes
unaltered... | 1 | safe_fprintf(FILE *f, const char *fmt, ...)
{
char fmtbuff_stack[256]; /* Place to format the printf() string. */
char outbuff[256]; /* Buffer for outgoing characters. */
char *fmtbuff_heap; /* If fmtbuff_stack is too small, we use malloc */
char *fmtbuff; /* Pointer to fmtbuff_stack or fmtbuff_heap. */
int fmtbu... | 311,304,728,748,629,950,000,000,000,000,000,000,000 | util.c | 62,782,488,428,051,630,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-8687 | Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename. | https://nvd.nist.gov/vuln/detail/CVE-2016-8687 |
160,639 | libarchive | e37b620fe8f14535d737e89a4dcabaed4517bf1a | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a | Issue #767: Buffer overflow printing a filename
The safe_fprintf function attempts to ensure clean output for an
arbitrary sequence of bytes by doing a trial conversion of the
multibyte characters to wide characters -- if the resulting wide
character is printable then we pass through the corresponding bytes
unaltered... | 0 | safe_fprintf(FILE *f, const char *fmt, ...)
{
char fmtbuff_stack[256]; /* Place to format the printf() string. */
char outbuff[256]; /* Buffer for outgoing characters. */
char *fmtbuff_heap; /* If fmtbuff_stack is too small, we use malloc */
char *fmtbuff; /* Pointer to fmtbuff_stack or fmtbuff_heap. */
int fmtbu... | 86,366,519,138,158,840,000,000,000,000,000,000,000 | util.c | 163,313,441,386,719,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-8687 | Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename. | https://nvd.nist.gov/vuln/detail/CVE-2016-8687 |
3,329 | linux | 647bf3d8a8e5777319da92af672289b2a6c4dc66 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66 | IB/rxe: Fix mem_check_range integer overflow
Update the range check to avoid integer-overflow in edge case.
Resolves CVE 2016-8636.
Signed-off-by: Eyal Itkin <eyal.itkin@gmail.com>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Doug Ledford <d... | 1 | int mem_check_range(struct rxe_mem *mem, u64 iova, size_t length)
{
switch (mem->type) {
case RXE_MEM_TYPE_DMA:
return 0;
case RXE_MEM_TYPE_MR:
case RXE_MEM_TYPE_FMR:
return ((iova < mem->iova) ||
((iova + length) > (mem->iova + mem->length))) ?
-EFAULT : 0;
default:
return -EFAULT;
}
}
| 35,540,940,678,846,424,000,000,000,000,000,000,000 | rxe_mr.c | 113,202,750,157,069,660,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-8636 | Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving t... | https://nvd.nist.gov/vuln/detail/CVE-2016-8636 |
160,642 | linux | 647bf3d8a8e5777319da92af672289b2a6c4dc66 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66 | IB/rxe: Fix mem_check_range integer overflow
Update the range check to avoid integer-overflow in edge case.
Resolves CVE 2016-8636.
Signed-off-by: Eyal Itkin <eyal.itkin@gmail.com>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Doug Ledford <d... | 0 | int mem_check_range(struct rxe_mem *mem, u64 iova, size_t length)
{
switch (mem->type) {
case RXE_MEM_TYPE_DMA:
return 0;
case RXE_MEM_TYPE_MR:
case RXE_MEM_TYPE_FMR:
if (iova < mem->iova ||
length > mem->length ||
iova > mem->iova + mem->length - length)
return -EFAULT;
return 0;
defau... | 135,034,422,546,563,840,000,000,000,000,000,000,000 | rxe_mr.c | 36,879,722,375,933,434,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-8636 | Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving t... | https://nvd.nist.gov/vuln/detail/CVE-2016-8636 |
3,330 | libass | aa54e0b59200a994d50a346b5d7ac818ebcf2d4b | https://github.com/libass/libass | https://github.com/libass/libass/commit/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b | shaper: fix reallocation
Update the variable that tracks the allocated size. This potentially
improves performance and avoid some side effects, which lead to
undefined behavior in some cases.
Fixes fuzzer test case id:000051,sig:11,sync:fuzzer3,src:004221. | 1 | static bool check_allocations(ASS_Shaper *shaper, size_t new_size)
{
if (new_size > shaper->n_glyphs) {
if (!ASS_REALLOC_ARRAY(shaper->event_text, new_size) ||
!ASS_REALLOC_ARRAY(shaper->ctypes, new_size) ||
!ASS_REALLOC_ARRAY(shaper->emblevels, new_size) ||
!ASS_REALLO... | 280,811,577,264,489,950,000,000,000,000,000,000,000 | ass_shaper.c | 28,748,660,120,420,735,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7972 | The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-7972 |
160,643 | libass | aa54e0b59200a994d50a346b5d7ac818ebcf2d4b | https://github.com/libass/libass | https://github.com/libass/libass/commit/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b | shaper: fix reallocation
Update the variable that tracks the allocated size. This potentially
improves performance and avoid some side effects, which lead to
undefined behavior in some cases.
Fixes fuzzer test case id:000051,sig:11,sync:fuzzer3,src:004221. | 0 | static bool check_allocations(ASS_Shaper *shaper, size_t new_size)
{
if (new_size > shaper->n_glyphs) {
if (!ASS_REALLOC_ARRAY(shaper->event_text, new_size) ||
!ASS_REALLOC_ARRAY(shaper->ctypes, new_size) ||
!ASS_REALLOC_ARRAY(shaper->emblevels, new_size) ||
!ASS_REALLO... | 33,445,553,358,012,500,000,000,000,000,000,000,000 | ass_shaper.c | 314,895,431,202,493,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7972 | The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-7972 |
3,331 | libass | 08e754612019ed84d1db0d1fc4f5798248decd75 | https://github.com/libass/libass | https://github.com/libass/libass/commit/08e754612019ed84d1db0d1fc4f5798248decd75 | Fix blur coefficient calculation buffer overflow
Found by fuzzer test case id:000082,sig:11,src:002579,op:havoc,rep:8.
Correctness should be checked, but this fixes the overflow for good. | 1 | static void calc_coeff(double mu[4], const int index[4], int prefilter, double r2, double mul)
{
double mul2 = mul * mul, mul3 = mul2 * mul;
double kernel[] = {
(5204 + 2520 * mul + 1092 * mul2 + 3280 * mul3) / 12096,
(2943 - 210 * mul - 273 * mul2 - 2460 * mul3) / 12096,
( 486 - 924 ... | 118,260,111,892,519,520,000,000,000,000,000,000,000 | ass_blur.c | 96,345,802,284,211,620,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-7970 | Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-7970 |
160,644 | libass | 08e754612019ed84d1db0d1fc4f5798248decd75 | https://github.com/libass/libass | https://github.com/libass/libass/commit/08e754612019ed84d1db0d1fc4f5798248decd75 | Fix blur coefficient calculation buffer overflow
Found by fuzzer test case id:000082,sig:11,src:002579,op:havoc,rep:8.
Correctness should be checked, but this fixes the overflow for good. | 0 | static void calc_coeff(double mu[4], const int index[4], int prefilter, double r2, double mul)
{
double mul2 = mul * mul, mul3 = mul2 * mul;
double kernel[] = {
(5204 + 2520 * mul + 1092 * mul2 + 3280 * mul3) / 12096,
(2943 - 210 * mul - 273 * mul2 - 2460 * mul3) / 12096,
( 486 - 924 ... | 82,660,506,467,555,930,000,000,000,000,000,000,000 | ass_blur.c | 328,259,086,246,453,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-7970 | Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-7970 |
3,332 | ImageMagick | d63a3c5729df59f183e9e110d5d8385d17caaad0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d63a3c5729df59f183e9e110d5d8385d17caaad0 | None | 1 | MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type)
{
const char
*artifact;
ImageInfo
*image_info;
MagickBooleanType
status;
QuantizeInfo
*quantize_info;
assert(image != (Image *) NULL);
if (image->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetM... | 186,672,624,143,323,880,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-7906 | magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7906 |
160,645 | ImageMagick | d63a3c5729df59f183e9e110d5d8385d17caaad0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d63a3c5729df59f183e9e110d5d8385d17caaad0 | None | 0 | MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type)
{
const char
*artifact;
ImageInfo
*image_info;
MagickBooleanType
status;
QuantizeInfo
*quantize_info;
assert(image != (Image *) NULL);
if (image->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetM... | 289,988,667,313,943,230,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-7906 | magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7906 |
3,333 | ImageMagick | a7bb158b7bedd1449a34432feb3a67c8f1873bfa | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa | https://github.com/ImageMagick/ImageMagick/issues/280 | 1 | MagickBooleanType SyncExifProfile(Image *image,StringInfo *profile)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define TAG_EXIF_OFFSET 0x8769
#define TAG_INTEROP_OFFSET 0xa005
typedef struct _DirectoryInfo
{
unsigned char
*directory;
size_t
entr... | 86,130,161,965,126,200,000,000,000,000,000,000,000 | profile.c | 226,382,576,658,349,350,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7799 | MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7799 |
160,646 | ImageMagick | a7bb158b7bedd1449a34432feb3a67c8f1873bfa | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa | https://github.com/ImageMagick/ImageMagick/issues/280 | 0 | MagickBooleanType SyncExifProfile(Image *image,StringInfo *profile)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define TAG_EXIF_OFFSET 0x8769
#define TAG_INTEROP_OFFSET 0xa005
typedef struct _DirectoryInfo
{
unsigned char
*directory;
size_t
entr... | 337,963,140,549,959,740,000,000,000,000,000,000,000 | profile.c | 111,191,593,916,868,450,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7799 | MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7799 |
3,341 | ImageMagick | a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7 | None | 1 | static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
int
bit;
register const PixelPacket
*p;
register ssize_t
x;
ssize_t
y;
unsigned char
byte;
/*
Open output image file.
*/
assert(... | 268,413,691,376,706,580,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2016-7540 | coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format. | https://nvd.nist.gov/vuln/detail/CVE-2016-7540 |
160,654 | ImageMagick | a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7 | None | 0 | static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image,
static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
int
bit;
register const PixelPacket
*p;
register ssize_t
x;
ssize_t
y;
unsigned char
b... | 138,507,627,219,454,330,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2016-7540 | coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format. | https://nvd.nist.gov/vuln/detail/CVE-2016-7540 |
3,349 | ImageMagick | bef1e4f637d8f665bc133a9c6d30df08d983bc3a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bef1e4f637d8f665bc133a9c6d30df08d983bc3a | https://github.com/ImageMagick/ImageMagick/issues/120 | 1 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 173,315,226,387,850,500,000,000,000,000,000,000,000 | wpg.c | 307,364,454,630,746,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7533 | The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7533 |
160,660 | ImageMagick | bef1e4f637d8f665bc133a9c6d30df08d983bc3a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bef1e4f637d8f665bc133a9c6d30df08d983bc3a | https://github.com/ImageMagick/ImageMagick/issues/120 | 0 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 62,741,228,354,330,960,000,000,000,000,000,000,000 | wpg.c | 178,696,501,667,658,330,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7533 | The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7533 |
3,353 | ImageMagick | a2e1064f288a353bc5fef7f79ccb7683759e775c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a2e1064f288a353bc5fef7f79ccb7683759e775c | https://github.com/ImageMagick/ImageMagick/issues/104 | 1 | static MagickBooleanType load_tile(Image *image,Image *tile_image,
XCFDocInfo *inDocInfo,XCFLayerInfo *inLayerInfo,size_t data_length,
ExceptionInfo *exception)
{
ssize_t
y;
register ssize_t
x;
register Quantum
*q;
ssize_t
count;
unsigned char
*graydata;
XCFPixelInfo
*xcfda... | 37,826,674,930,539,910,000,000,000,000,000,000,000 | xcf.c | 69,929,030,200,192,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7529 | coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7529 |
160,662 | ImageMagick | a2e1064f288a353bc5fef7f79ccb7683759e775c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a2e1064f288a353bc5fef7f79ccb7683759e775c | https://github.com/ImageMagick/ImageMagick/issues/104 | 0 | static MagickBooleanType load_tile(Image *image,Image *tile_image,
XCFDocInfo *inDocInfo,XCFLayerInfo *inLayerInfo,size_t data_length,
ExceptionInfo *exception)
{
ssize_t
y;
register ssize_t
x;
register Quantum
*q;
ssize_t
count;
unsigned char
*graydata;
XCFPixelInfo
*xcfda... | 74,732,995,727,965,610,000,000,000,000,000,000,000 | xcf.c | 74,364,607,248,796,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7529 | coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7529 |
3,354 | ImageMagick | ca0c886abd6d3ef335eb74150cd23b89ebd17135 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ca0c886abd6d3ef335eb74150cd23b89ebd17135 | None | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 260,039,204,831,931,700,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-7528 | The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7528 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.