idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
160,663
ImageMagick
ca0c886abd6d3ef335eb74150cd23b89ebd17135
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ca0c886abd6d3ef335eb74150cd23b89ebd17135
None
0
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
219,975,787,260,886,000,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-7528
The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7528
3,358
ImageMagick
30eec879c8b446b0ea9a3bb0da1a441cc8482bc4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/30eec879c8b446b0ea9a3bb0da1a441cc8482bc4
Moved check for https://github.com/ImageMagick/ImageMagick/issues/92.
1
static ssize_t DecodePSDPixels(const size_t number_compact_pixels, const unsigned char *compact_pixels,const ssize_t depth, const size_t number_pixels,unsigned char *pixels) { #define CheckNumberCompactPixels \ if (packets == 0) \ return(i); \ packets-- #define CheckNumberPixels(count) \ if (((ssize_t) i...
23,578,839,469,788,660,000,000,000,000,000,000,000
psd.c
171,607,370,422,252,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7521
Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7521
160,664
ImageMagick
30eec879c8b446b0ea9a3bb0da1a441cc8482bc4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/30eec879c8b446b0ea9a3bb0da1a441cc8482bc4
Moved check for https://github.com/ImageMagick/ImageMagick/issues/92.
0
static ssize_t DecodePSDPixels(const size_t number_compact_pixels, const unsigned char *compact_pixels,const ssize_t depth, const size_t number_pixels,unsigned char *pixels) { #define CheckNumberCompactPixels \ if (packets == 0) \ return(i); \ packets-- #define CheckNumberPixels(count) \ if (((ssize_t) i...
142,131,229,181,755,830,000,000,000,000,000,000,000
psd.c
140,063,542,016,156,050,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7521
Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7521
3,359
ImageMagick
14e606db148d6ebcaae20f1e1d6d71903ca4a556
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/14e606db148d6ebcaae20f1e1d6d71903ca4a556
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537213
1
static MagickBooleanType WriteHDRImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char header[MagickPathExtent]; const char *property; MagickBooleanType status; register const Quantum *p; register ssize_t i, x; size_t length; ssize_t count...
243,995,582,969,504,570,000,000,000,000,000,000,000
hdr.c
259,117,064,436,547,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7520
Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7520
160,665
ImageMagick
14e606db148d6ebcaae20f1e1d6d71903ca4a556
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/14e606db148d6ebcaae20f1e1d6d71903ca4a556
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537213
0
static MagickBooleanType WriteHDRImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char header[MagickPathExtent]; const char *property; MagickBooleanType status; register const Quantum *p; register ssize_t i, x; size_t length; ssize_t count...
267,116,335,028,956,460,000,000,000,000,000,000,000
hdr.c
267,598,724,820,380,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7520
Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7520
3,360
ImageMagick
2ad6d33493750a28a5a655d319a8e0b16c392de1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2ad6d33493750a28a5a655d319a8e0b16c392de1
Fixed check for the number of pixels that will be allocated.
1
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; int opcode, operand, status; ...
166,192,220,511,748,400,000,000,000,000,000,000,000
rle.c
305,611,083,519,864,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7515
The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels.
https://nvd.nist.gov/vuln/detail/CVE-2016-7515
160,666
ImageMagick
2ad6d33493750a28a5a655d319a8e0b16c392de1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2ad6d33493750a28a5a655d319a8e0b16c392de1
Fixed check for the number of pixels that will be allocated.
0
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; int opcode, operand, status; ...
100,323,503,807,444,640,000,000,000,000,000,000,000
rle.c
33,747,663,647,921,126,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7515
The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels.
https://nvd.nist.gov/vuln/detail/CVE-2016-7515
3,364
nefarious2
f50a84bad996d438e7b31b9e74c32a41e43f8be5
https://github.com/evilnet/nefarious2
https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5
Fix to prevent SASL security vulnerability
1
int m_authenticate(struct Client* cptr, struct Client* sptr, int parc, char* parv[]) { struct Client* acptr; int first = 0; char realhost[HOSTLEN + 3]; char *hoststr = (cli_sockhost(cptr) ? cli_sockhost(cptr) : cli_sock_ip(cptr)); if (!CapActive(cptr, CAP_SASL)) return 0; if (parc < 2) /* have enough ...
270,299,999,591,578,300,000,000,000,000,000,000,000
m_authenticate.c
308,034,972,284,734,170,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2016-7145
The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
https://nvd.nist.gov/vuln/detail/CVE-2016-7145
160,670
nefarious2
f50a84bad996d438e7b31b9e74c32a41e43f8be5
https://github.com/evilnet/nefarious2
https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5
Fix to prevent SASL security vulnerability
0
int m_authenticate(struct Client* cptr, struct Client* sptr, int parc, char* parv[]) { struct Client* acptr; int first = 0; char realhost[HOSTLEN + 3]; char *hoststr = (cli_sockhost(cptr) ? cli_sockhost(cptr) : cli_sock_ip(cptr)); if (!CapActive(cptr, CAP_SASL)) return 0; if (parc < 2) /* have enough ...
75,269,715,363,117,660,000,000,000,000,000,000,000
m_authenticate.c
149,150,419,058,536,770,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2016-7145
The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
https://nvd.nist.gov/vuln/detail/CVE-2016-7145
3,365
unrealircd
f473e355e1dc422c4f019dbf86bc50ba1a34a766
https://github.com/unrealircd/unrealircd
https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766
Fix AUTHENTICATE bug
1
CMD_FUNC(m_authenticate) { aClient *agent_p = NULL; /* Failing to use CAP REQ for sasl is a protocol violation. */ if (!SASL_SERVER || !MyConnect(sptr) || BadPtr(parv[1]) || !CHECKPROTO(sptr, PROTO_SASL)) return 0; if (sptr->local->sasl_complete) { sendto_one(sptr, err_str(ERR_SASLALREADY), me.name, BadPtr(s...
190,787,633,910,337,700,000,000,000,000,000,000,000
None
null
[ "CWE-287" ]
CVE-2016-7144
The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
https://nvd.nist.gov/vuln/detail/CVE-2016-7144
160,671
unrealircd
f473e355e1dc422c4f019dbf86bc50ba1a34a766
https://github.com/unrealircd/unrealircd
https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766
Fix AUTHENTICATE bug
0
CMD_FUNC(m_authenticate) { aClient *agent_p = NULL; /* Failing to use CAP REQ for sasl is a protocol violation. */ if (!SASL_SERVER || !MyConnect(sptr) || BadPtr(parv[1]) || !CHECKPROTO(sptr, PROTO_SASL)) return 0; if (sptr->local->sasl_complete) { sendto_one(sptr, err_str(ERR_SASLALREADY), me.name, BadPtr(s...
229,825,302,368,766,140,000,000,000,000,000,000,000
None
null
[ "CWE-287" ]
CVE-2016-7144
The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
https://nvd.nist.gov/vuln/detail/CVE-2016-7144
3,372
libgd
4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae
Fix invalid read in gdImageCreateFromTiffPtr() tiff_invalid_read.tiff is corrupt, and causes an invalid read in gdImageCreateFromTiffPtr(), but not in gdImageCreateFromTiff(). The culprit is dynamicGetbuf(), which doesn't check for out-of-bound reads. In this case, dynamicGetbuf() is called with a negative dp->pos, bu...
1
static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len) { int rlen, remain; dpIOCtxPtr dctx; dynamicPtr *dp; dctx = (dpIOCtxPtr) ctx; dp = dctx->dp; remain = dp->logicalSize - dp->pos; if(remain >= len) { rlen = len; } else { if(remain <= 0) { /* 2.0.34: EOF is incorrect. We use 0 for ...
113,302,243,464,312,720,000,000,000,000,000,000,000
gd_io_dp.c
169,924,014,127,142,480,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-6911
The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
https://nvd.nist.gov/vuln/detail/CVE-2016-6911
160,677
libgd
4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae
Fix invalid read in gdImageCreateFromTiffPtr() tiff_invalid_read.tiff is corrupt, and causes an invalid read in gdImageCreateFromTiffPtr(), but not in gdImageCreateFromTiff(). The culprit is dynamicGetbuf(), which doesn't check for out-of-bound reads. In this case, dynamicGetbuf() is called with a negative dp->pos, bu...
0
static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len) { int rlen, remain; dpIOCtxPtr dctx; dynamicPtr *dp; dctx = (dpIOCtxPtr) ctx; dp = dctx->dp; if (dp->pos < 0 || dp->pos >= dp->realSize) { return 0; } remain = dp->logicalSize - dp->pos; if(remain >= len) { rlen = len; } else { i...
92,793,353,838,893,120,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6911
The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
https://nvd.nist.gov/vuln/detail/CVE-2016-6911
3,375
ImageMagick
4cc6ec8a4197d4c008577127736bf7985d632323
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323
Prevent buffer overflow in BMP coder (bug report from pwchen of tencent).
1
static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { BMPInfo bmp_info; const char *option; const StringInfo *profile; MagickBooleanType have_color_info, status; MagickOffsetType scene; MemoryInfo *pixel_info; regis...
171,765,265,288,600,100,000,000,000,000,000,000,000
bmp.c
142,605,325,816,453,950,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-6823
Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2016-6823
160,679
ImageMagick
4cc6ec8a4197d4c008577127736bf7985d632323
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323
Prevent buffer overflow in BMP coder (bug report from pwchen of tencent).
0
static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { BMPInfo bmp_info; const char *option; const StringInfo *profile; MagickBooleanType have_color_info, status; MagickOffsetType scene; MemoryInfo *pixel_info; regis...
235,291,570,304,609,800,000,000,000,000,000,000,000
bmp.c
252,779,019,518,174,600,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-6823
Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2016-6823
3,383
openjpeg
162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
Fix Heap Buffer Overflow in function color_cmyk_to_rgb Fix uclouvain/openjpeg#774
1
void color_cmyk_to_rgb(opj_image_t *image) { float C, M, Y, K; float sC, sM, sY, sK; unsigned int w, h, max, i; w = image->comps[0].w; h = image->comps[0].h; if(image->numcomps < 4) return; max = w * h; sC = 1.0F / (float)((1 << image->comps[0].prec) - 1); sM = 1.0F / (float)((1 << image->comps[1].p...
174,303,624,607,131,550,000,000,000,000,000,000,000
color.c
144,381,218,147,487,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4796
Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file.
https://nvd.nist.gov/vuln/detail/CVE-2016-4796
160,688
openjpeg
162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
Fix Heap Buffer Overflow in function color_cmyk_to_rgb Fix uclouvain/openjpeg#774
0
void color_cmyk_to_rgb(opj_image_t *image) { float C, M, Y, K; float sC, sM, sY, sK; unsigned int w, h, max, i; w = image->comps[0].w; h = image->comps[0].h; if ( (image->numcomps < 4) || (image->comps[0].dx != image->comps[1].dx) || (image->comps[0].dx != image->comps[2].dx) || (image->comps[0].dx != ...
153,218,819,749,202,490,000,000,000,000,000,000,000
color.c
236,919,714,230,762,480,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4796
Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file.
https://nvd.nist.gov/vuln/detail/CVE-2016-4796
3,384
linux
d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
https://github.com/torvalds/linux
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
None
1
static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, u64 param3, u64 param4) { int rc; u64 base_addr, size; /* If user manually set "flags", make sure it is legal */ if (flags && (flags & ~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_FLAGS_PCIE_SBDF))) return -EINVAL; /* * W...
189,767,553,214,590,050,000,000,000,000,000,000,000
None
null
[ "CWE-74" ]
CVE-2016-3695
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
https://nvd.nist.gov/vuln/detail/CVE-2016-3695
160,689
linux
d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
https://github.com/torvalds/linux
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
None
0
static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, u64 param3, u64 param4) { int rc; u64 base_addr, size; if (get_securelevel() > 0) return -EPERM; /* If user manually set "flags", make sure it is legal */ if (flags && (flags & ~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_F...
262,935,305,834,805,200,000,000,000,000,000,000,000
None
null
[ "CWE-74" ]
CVE-2016-3695
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
https://nvd.nist.gov/vuln/detail/CVE-2016-3695
3,389
miniupnp
140ee8d2204b383279f854802b27bdb41c1d5d1a
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/140ee8d2204b383279f854802b27bdb41c1d5d1a
minissdpd.c: Initialize pointers to NULL (fix)
1
void processRequest(struct reqelem * req) { ssize_t n; unsigned int l, m; unsigned char buf[2048]; const unsigned char * p; int type; struct device * d = devlist; unsigned char rbuf[4096]; unsigned char * rp = rbuf+1; unsigned char nrep = 0; time_t t; struct service * newserv = NULL; struct service * serv; ...
37,126,454,427,764,617,000,000,000,000,000,000,000
minissdpd.c
80,138,051,541,731,040,000,000,000,000,000,000,000
[ "CWE-388" ]
CVE-2016-3179
The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (invalid free and daemon crash) via vectors related to error handling.
https://nvd.nist.gov/vuln/detail/CVE-2016-3179
160,690
miniupnp
140ee8d2204b383279f854802b27bdb41c1d5d1a
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/140ee8d2204b383279f854802b27bdb41c1d5d1a
minissdpd.c: Initialize pointers to NULL (fix)
0
void processRequest(struct reqelem * req) { ssize_t n; unsigned int l, m; unsigned char buf[2048]; const unsigned char * p; int type; struct device * d = devlist; unsigned char rbuf[4096]; unsigned char * rp = rbuf+1; unsigned char nrep = 0; time_t t; struct service * newserv = NULL; struct service * serv; ...
12,438,808,535,568,261,000,000,000,000,000,000,000
minissdpd.c
4,046,485,048,239,267,000,000,000,000,000,000,000
[ "CWE-388" ]
CVE-2016-3179
The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (invalid free and daemon crash) via vectors related to error handling.
https://nvd.nist.gov/vuln/detail/CVE-2016-3179
3,390
miniupnp
b238cade9a173c6f751a34acf8ccff838a62aa47
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47
minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero
1
void processRequest(struct reqelem * req) { ssize_t n; unsigned int l, m; unsigned char buf[2048]; const unsigned char * p; enum request_type type; struct device * d = devlist; unsigned char rbuf[RESPONSE_BUFFER_SIZE]; unsigned char * rp; unsigned char nrep = 0; time_t t; struct service * newserv = NULL; st...
230,723,959,165,221,830,000,000,000,000,000,000,000
minissdpd.c
313,447,235,104,272,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-3178
The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value.
https://nvd.nist.gov/vuln/detail/CVE-2016-3178
160,691
miniupnp
b238cade9a173c6f751a34acf8ccff838a62aa47
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47
minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero
0
void processRequest(struct reqelem * req) { ssize_t n; unsigned int l, m; unsigned char buf[2048]; const unsigned char * p; enum request_type type; struct device * d = devlist; unsigned char rbuf[RESPONSE_BUFFER_SIZE]; unsigned char * rp; unsigned char nrep = 0; time_t t; struct service * newserv = NULL; st...
91,023,075,434,640,580,000,000,000,000,000,000,000
minissdpd.c
31,382,398,235,247,496,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-3178
The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value.
https://nvd.nist.gov/vuln/detail/CVE-2016-3178
3,392
lhasa
6fcdb8f1f538b9d63e63a5fa199c5514a15d4564
https://github.com/fragglet/lhasa
https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564
Fix integer underflow vulnerability in L3 decode. Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header decoding routines were vulnerable to an integer underflow, if the 32-bit header length was less than the base level 3 header length. This could lead to an exploitable heap corruption condition. Th...
1
static int decode_level3_header(LHAFileHeader **header, LHAInputStream *stream) { unsigned int header_len; if (lha_decode_uint16(&RAW_DATA(header, 0)) != 4) { return 0; } if (!extend_raw_data(header, stream, LEVEL_3_HEADER_LEN - RAW_DATA_LEN(header))) { return 0; } header_len = l...
82,334,831,641,499,670,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-2347
Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-2347
160,693
lhasa
6fcdb8f1f538b9d63e63a5fa199c5514a15d4564
https://github.com/fragglet/lhasa
https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564
Fix integer underflow vulnerability in L3 decode. Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header decoding routines were vulnerable to an integer underflow, if the 32-bit header length was less than the base level 3 header length. This could lead to an exploitable heap corruption condition. Th...
0
static int decode_level3_header(LHAFileHeader **header, LHAInputStream *stream) { unsigned int header_len; if (lha_decode_uint16(&RAW_DATA(header, 0)) != 4) { return 0; } if (!extend_raw_data(header, stream, LEVEL_3_HEADER_LEN - RAW_DATA_LEN(header))) { return 0; } header_len = l...
13,827,641,392,102,537,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-2347
Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-2347
3,398
ImageMagick
9b428b7af688fe319320aed15f2b94281d1e37b4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4
None
1
static MagickBooleanType SkipDXTMipmaps(Image *image,DDSInfo *dds_info, int texel_size,ExceptionInfo *exception) { register ssize_t i; MagickOffsetType offset; size_t h, w; /* Only skip mipmaps for textures and cube maps */ if (EOFBlob(image) != MagickFalse) { ThrowFileExc...
161,526,989,354,860,710,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2015-8959
coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8959
160,697
ImageMagick
9b428b7af688fe319320aed15f2b94281d1e37b4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4
None
0
static MagickBooleanType SkipDXTMipmaps(Image *image,DDSInfo *dds_info, int texel_size,ExceptionInfo *exception) { register ssize_t i; MagickOffsetType offset; size_t h, w; /* Only skip mipmaps for textures and cube maps */ if (EOFBlob(image) != MagickFalse) { ThrowFileExc...
135,142,054,378,691,100,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2015-8959
coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8959
3,400
ImageMagick
97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6
Fixed infinite loop and added checks for the sscanf result.
1
static Image *ReadHDRImage(const ImageInfo *image_info,ExceptionInfo *exception) { char format[MaxTextExtent], keyword[MaxTextExtent], tag[MaxTextExtent], value[MaxTextExtent]; double gamma; Image *image; int c; MagickBooleanType status, value_expected; register Quan...
132,512,135,164,293,850,000,000,000,000,000,000,000
hdr.c
197,334,708,565,562,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-8900
The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8900
160,698
ImageMagick
97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6
Fixed infinite loop and added checks for the sscanf result.
0
static Image *ReadHDRImage(const ImageInfo *image_info,ExceptionInfo *exception) { char format[MaxTextExtent], keyword[MaxTextExtent], tag[MaxTextExtent], value[MaxTextExtent]; double gamma; Image *image; int c; MagickBooleanType status, value_expected; register Quan...
105,221,324,722,130,400,000,000,000,000,000,000,000
hdr.c
189,433,786,930,264,830,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-8900
The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8900
3,401
ImageMagick
5b4bebaa91849c592a8448bc353ab25a54ff8c44
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/5b4bebaa91849c592a8448bc353ab25a54ff8c44
https://github.com/ImageMagick/ImageMagick/pull/34
1
MagickExport MagickBooleanType WriteImages(const ImageInfo *image_info, Image *images,const char *filename,ExceptionInfo *exception) { #define WriteImageTag "Write/Image" ExceptionInfo *sans_exception; ImageInfo *write_info; MagickBooleanType proceed; MagickOffsetType progress; MagickP...
295,077,649,590,654,430,000,000,000,000,000,000,000
constitute.c
61,617,961,026,596,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-8898
The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8898
160,699
ImageMagick
5b4bebaa91849c592a8448bc353ab25a54ff8c44
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/5b4bebaa91849c592a8448bc353ab25a54ff8c44
https://github.com/ImageMagick/ImageMagick/pull/34
0
MagickExport MagickBooleanType WriteImages(const ImageInfo *image_info, Image *images,const char *filename,ExceptionInfo *exception) { #define WriteImageTag "Write/Image" ExceptionInfo *sans_exception; ImageInfo *write_info; MagickBooleanType proceed; MagickOffsetType progress; MagickP...
321,109,016,875,635,860,000,000,000,000,000,000,000
constitute.c
199,859,930,407,694,200,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-8898
The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8898
3,402
ImageMagick
7b1cf5784b5bcd85aa9293ecf56769f68c037231
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7b1cf5784b5bcd85aa9293ecf56769f68c037231
Fixed out of bounds error in SpliceImage.
1
MagickExport Image *SpliceImage(const Image *image, const RectangleInfo *geometry,ExceptionInfo *exception) { #define SpliceImageTag "Splice/Image" CacheView *image_view, *splice_view; Image *splice_image; MagickBooleanType status; MagickOffsetType progress; RectangleInfo spli...
15,111,872,907,779,805,000,000,000,000,000,000,000
transform.c
99,447,129,808,024,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8897
The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8897
160,700
ImageMagick
7b1cf5784b5bcd85aa9293ecf56769f68c037231
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7b1cf5784b5bcd85aa9293ecf56769f68c037231
Fixed out of bounds error in SpliceImage.
0
MagickExport Image *SpliceImage(const Image *image, const RectangleInfo *geometry,ExceptionInfo *exception) { #define SpliceImageTag "Splice/Image" CacheView *image_view, *splice_view; Image *splice_image; MagickBooleanType status; MagickOffsetType progress; RectangleInfo spli...
159,875,931,282,199,700,000,000,000,000,000,000,000
transform.c
163,461,686,609,171,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8897
The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8897
3,408
ImageMagick
0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
1
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPIC...
268,543,993,326,910,650,000,000,000,000,000,000,000
pict.c
191,832,857,215,210,400,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-8896
Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8896
160,706
ImageMagick
0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
0
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPIC...
95,822,017,928,684,620,000,000,000,000,000,000,000
pict.c
16,918,765,499,069,375,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-8896
Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8896
3,409
ImageMagick
4f68e9661518463fca523c9726bb5d940a2aa6d8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362
1
static Image *ReadTGAImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; MagickBooleanType status; PixelInfo pixel; Quantum index; register Quantum *q; register ssize_t i, x; size_t base, flag, offset, real, skip; ssize_t ...
240,609,813,257,975,770,000,000,000,000,000,000,000
tga.c
312,438,178,534,953,840,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2015-8894
Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8894
160,707
ImageMagick
4f68e9661518463fca523c9726bb5d940a2aa6d8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362
0
static Image *ReadTGAImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; MagickBooleanType status; PixelInfo pixel; Quantum index; register Quantum *q; register ssize_t i, x; size_t base, flag, offset, real, skip; ssize_t ...
91,874,687,946,556,900,000,000,000,000,000,000,000
tga.c
77,408,969,979,215,250,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2015-8894
Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8894
3,410
exfat
2e86ae5f81da11f11673d0546efb525af02b7786
https://github.com/relan/exfat
https://github.com/relan/exfat/commit/2e86ae5f81da11f11673d0546efb525af02b7786
None
1
int exfat_mount(struct exfat* ef, const char* spec, const char* options) { int rc; enum exfat_mode mode; exfat_tzset(); memset(ef, 0, sizeof(struct exfat)); parse_options(ef, options); if (match_option(options, "ro")) mode = EXFAT_MODE_RO; else if (match_option(options, "ro_fallback")) mode = EXFAT_MODE_A...
172,240,473,177,799,060,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-8026
Heap-based buffer overflow in the verify_vbr_checksum function in exfatfsck in exfat-utils before 1.2.1 allows remote attackers to cause a denial of service (infinite loop) or possibly execute arbitrary code via a crafted filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2015-8026
160,708
exfat
2e86ae5f81da11f11673d0546efb525af02b7786
https://github.com/relan/exfat
https://github.com/relan/exfat/commit/2e86ae5f81da11f11673d0546efb525af02b7786
None
0
int exfat_mount(struct exfat* ef, const char* spec, const char* options) { int rc; enum exfat_mode mode; exfat_tzset(); memset(ef, 0, sizeof(struct exfat)); parse_options(ef, options); if (match_option(options, "ro")) mode = EXFAT_MODE_RO; else if (match_option(options, "ro_fallback")) mode = EXFAT_MODE_A...
45,705,562,859,276,480,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-8026
Heap-based buffer overflow in the verify_vbr_checksum function in exfatfsck in exfat-utils before 1.2.1 allows remote attackers to cause a denial of service (infinite loop) or possibly execute arbitrary code via a crafted filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2015-8026
3,411
linux
4b2b64d5a6ebc84214755ebccd599baef7c1b798
https://github.com/torvalds/linux
https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798
None
1
setup_efi_state(struct boot_params *params, unsigned long params_load_addr, unsigned int efi_map_offset, unsigned int efi_map_sz, unsigned int efi_setup_data_offset) { struct efi_info *current_ei = &boot_params.efi_info; struct efi_info *ei = &params->efi_info; if (!current_ei->efi_memmap_size) return 0; /*...
305,796,494,330,244,700,000,000,000,000,000,000,000
None
null
[ "CWE-254" ]
CVE-2015-7837
The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
https://nvd.nist.gov/vuln/detail/CVE-2015-7837
160,709
linux
4b2b64d5a6ebc84214755ebccd599baef7c1b798
https://github.com/torvalds/linux
https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798
None
0
setup_efi_state(struct boot_params *params, unsigned long params_load_addr, unsigned int efi_map_offset, unsigned int efi_map_sz, unsigned int efi_setup_data_offset) { struct efi_info *current_ei = &boot_params.efi_info; struct efi_info *ei = &params->efi_info; if (!current_ei->efi_memmap_size) return 0; /*...
81,635,001,860,321,660,000,000,000,000,000,000,000
None
null
[ "CWE-254" ]
CVE-2015-7837
The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
https://nvd.nist.gov/vuln/detail/CVE-2015-7837
3,414
pgbouncer
7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38
Remove too early set of auth_user When query returns 0 rows (user not found), this user stays as login user... Should fix #69.
1
static void start_auth_request(PgSocket *client, const char *username) { int res; PktBuf *buf; client->auth_user = client->db->auth_user; /* have to fetch user info from db */ client->pool = get_pool(client->db, client->db->auth_user); if (!find_server(client)) { client->wait_for_user_conn = true; retu...
192,440,722,953,440,760,000,000,000,000,000,000,000
client.c
115,609,358,804,220,030,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2015-6817
PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows remote attackers to gain login access as auth_user via an unknown username.
https://nvd.nist.gov/vuln/detail/CVE-2015-6817
160,712
pgbouncer
7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38
Remove too early set of auth_user When query returns 0 rows (user not found), this user stays as login user... Should fix #69.
0
static void start_auth_request(PgSocket *client, const char *username) { int res; PktBuf *buf; /* have to fetch user info from db */ client->pool = get_pool(client->db, client->db->auth_user); if (!find_server(client)) { client->wait_for_user_conn = true; return; } slog_noise(client, "Doing auth_conn ...
79,205,329,567,611,970,000,000,000,000,000,000,000
client.c
158,411,821,133,249,770,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2015-6817
PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows remote attackers to gain login access as auth_user via an unknown username.
https://nvd.nist.gov/vuln/detail/CVE-2015-6817
3,416
jasper
df5d2867e8004e51e18b89865bc4aa69229227b3
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/df5d2867e8004e51e18b89865bc4aa69229227b3
CVE-2015-5221
1
static int mif_process_cmpt(mif_hdr_t *hdr, char *buf) { jas_tvparser_t *tvp; mif_cmpt_t *cmpt; int id; cmpt = 0; tvp = 0; if (!(cmpt = mif_cmpt_create())) { goto error; } cmpt->tlx = 0; cmpt->tly = 0; cmpt->sampperx = 0; cmpt->samppery = 0; cmpt->width = 0; cmpt->height = 0; cmpt->prec = 0; cmpt->sg...
219,089,908,130,942,330,000,000,000,000,000,000,000
mif_cod.c
316,893,017,337,693,300,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2015-5221
Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5221
160,714
jasper
df5d2867e8004e51e18b89865bc4aa69229227b3
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/df5d2867e8004e51e18b89865bc4aa69229227b3
CVE-2015-5221
0
static int mif_process_cmpt(mif_hdr_t *hdr, char *buf) { jas_tvparser_t *tvp; mif_cmpt_t *cmpt; int id; cmpt = 0; tvp = 0; if (!(cmpt = mif_cmpt_create())) { goto error; } cmpt->tlx = 0; cmpt->tly = 0; cmpt->sampperx = 0; cmpt->samppery = 0; cmpt->width = 0; cmpt->height = 0; cmpt->prec = 0; cmpt->sg...
10,083,764,080,444,983,000,000,000,000,000,000,000
mif_cod.c
254,401,579,117,563,020,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2015-5221
Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5221
3,421
pgbouncer
74d6e5f7de5ec736f71204b7b422af7380c19ac5
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5
Check if auth_user is set. Fixes a crash if password packet appears before startup packet (#42).
1
static bool handle_client_startup(PgSocket *client, PktHdr *pkt) { const char *passwd; const uint8_t *key; bool ok; SBuf *sbuf = &client->sbuf; /* don't tolerate partial packets */ if (incomplete_pkt(pkt)) { disconnect_client(client, true, "client sent partial pkt in startup phase"); return false; } if (...
278,553,822,929,822,730,000,000,000,000,000,000,000
client.c
284,183,957,477,570,960,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
https://nvd.nist.gov/vuln/detail/CVE-2015-4054
160,719
pgbouncer
74d6e5f7de5ec736f71204b7b422af7380c19ac5
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5
Check if auth_user is set. Fixes a crash if password packet appears before startup packet (#42).
0
static bool handle_client_startup(PgSocket *client, PktHdr *pkt) { const char *passwd; const uint8_t *key; bool ok; SBuf *sbuf = &client->sbuf; /* don't tolerate partial packets */ if (incomplete_pkt(pkt)) { disconnect_client(client, true, "client sent partial pkt in startup phase"); return false; } if (...
114,851,079,844,768,040,000,000,000,000,000,000,000
client.c
231,648,386,052,178,430,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
https://nvd.nist.gov/vuln/detail/CVE-2015-4054
3,431
linux
60a2362f769cf549dc466134efe71c8bf9fbaaba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba
regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing After freeing pin from regulator_ena_gpio_free, loop can access the pin. So this patch fixes not to access pin after freeing. Signed-off-by: Seung-Woo Kim <sw0312.kim@samsung.com> Signed-off-by: Mark Brown <broonie@kernel.org>
1
static void regulator_ena_gpio_free(struct regulator_dev *rdev) { struct regulator_enable_gpio *pin, *n; if (!rdev->ena_pin) return; /* Free the GPIO only in case of no use */ list_for_each_entry_safe(pin, n, &regulator_ena_gpio_list, list) { if (pin->gpiod == rdev->ena_pin->gpiod) { if (pin->request_count...
153,964,382,604,737,770,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2014-9940
The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2014-9940
160,724
linux
60a2362f769cf549dc466134efe71c8bf9fbaaba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba
regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing After freeing pin from regulator_ena_gpio_free, loop can access the pin. So this patch fixes not to access pin after freeing. Signed-off-by: Seung-Woo Kim <sw0312.kim@samsung.com> Signed-off-by: Mark Brown <broonie@kernel.org>
0
static void regulator_ena_gpio_free(struct regulator_dev *rdev) { struct regulator_enable_gpio *pin, *n; if (!rdev->ena_pin) return; /* Free the GPIO only in case of no use */ list_for_each_entry_safe(pin, n, &regulator_ena_gpio_list, list) { if (pin->gpiod == rdev->ena_pin->gpiod) { if (pin->request_count...
51,396,502,597,491,960,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2014-9940
The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2014-9940
3,432
linux
69c433ed2ecd2d3264efd7afec4439524b319121
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
fs: limit filesystem stacking depth Add a simple read-only counter to super_block that indicates how deep this is in the stack of filesystems. Previously ecryptfs was the only stackable filesystem and it explicitly disallowed multiple layers of itself. Overlayfs, however, can be stacked recursively and also may be s...
1
static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *raw_data) { struct super_block *s; struct ecryptfs_sb_info *sbi; struct ecryptfs_dentry_info *root_info; const char *err = "Getting sb failed"; struct inode *inode; struct path path; uid_t check_ruid;...
206,875,532,923,431,400,000,000,000,000,000,000,000
main.c
105,638,946,343,753,250,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-9922
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-9922
160,725
linux
69c433ed2ecd2d3264efd7afec4439524b319121
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
fs: limit filesystem stacking depth Add a simple read-only counter to super_block that indicates how deep this is in the stack of filesystems. Previously ecryptfs was the only stackable filesystem and it explicitly disallowed multiple layers of itself. Overlayfs, however, can be stacked recursively and also may be s...
0
static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *raw_data) { struct super_block *s; struct ecryptfs_sb_info *sbi; struct ecryptfs_dentry_info *root_info; const char *err = "Getting sb failed"; struct inode *inode; struct path path; uid_t check_ruid;...
7,752,379,790,910,423,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-9922
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-9922
3,433
linux
69c433ed2ecd2d3264efd7afec4439524b319121
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
fs: limit filesystem stacking depth Add a simple read-only counter to super_block that indicates how deep this is in the stack of filesystems. Previously ecryptfs was the only stackable filesystem and it explicitly disallowed multiple layers of itself. Overlayfs, however, can be stacked recursively and also may be s...
1
static int ovl_fill_super(struct super_block *sb, void *data, int silent) { struct path lowerpath; struct path upperpath; struct path workpath; struct inode *root_inode; struct dentry *root_dentry; struct ovl_entry *oe; struct ovl_fs *ufs; struct kstatfs statfs; int err; err = -ENOMEM; ufs = kzalloc(sizeof(...
242,173,763,105,780,330,000,000,000,000,000,000,000
super.c
28,355,160,904,642,360,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-9922
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-9922
160,726
linux
69c433ed2ecd2d3264efd7afec4439524b319121
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
fs: limit filesystem stacking depth Add a simple read-only counter to super_block that indicates how deep this is in the stack of filesystems. Previously ecryptfs was the only stackable filesystem and it explicitly disallowed multiple layers of itself. Overlayfs, however, can be stacked recursively and also may be s...
0
static int ovl_fill_super(struct super_block *sb, void *data, int silent) { struct path lowerpath; struct path upperpath; struct path workpath; struct inode *root_inode; struct dentry *root_dentry; struct ovl_entry *oe; struct ovl_fs *ufs; struct kstatfs statfs; int err; err = -ENOMEM; ufs = kzalloc(sizeof(...
146,514,829,432,940,000,000,000,000,000,000,000,000
super.c
172,839,926,408,435,900,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-9922
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-9922
3,434
linux
9709674e68646cee5a24e3000b3558d25412203a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9709674e68646cee5a24e3000b3558d25412203a
ipv4: fix a race in ip4_datagram_release_cb() Alexey gave a AddressSanitizer[1] report that finally gave a good hint at where was the origin of various problems already reported by Dormando in the past [2] Problem comes from the fact that UDP can have a lockless TX path, and concurrent threads can manipulate sk_dst_c...
1
void ip4_datagram_release_cb(struct sock *sk) { const struct inet_sock *inet = inet_sk(sk); const struct ip_options_rcu *inet_opt; __be32 daddr = inet->inet_daddr; struct flowi4 fl4; struct rtable *rt; if (! __sk_dst_get(sk) || __sk_dst_check(sk, 0)) return; rcu_read_lock(); inet_opt = rcu_derefere...
311,398,138,099,162,900,000,000,000,000,000,000,000
datagram.c
337,751,027,115,515,430,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2014-9914
Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sock...
https://nvd.nist.gov/vuln/detail/CVE-2014-9914
160,727
linux
9709674e68646cee5a24e3000b3558d25412203a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9709674e68646cee5a24e3000b3558d25412203a
ipv4: fix a race in ip4_datagram_release_cb() Alexey gave a AddressSanitizer[1] report that finally gave a good hint at where was the origin of various problems already reported by Dormando in the past [2] Problem comes from the fact that UDP can have a lockless TX path, and concurrent threads can manipulate sk_dst_c...
0
void ip4_datagram_release_cb(struct sock *sk) { const struct inet_sock *inet = inet_sk(sk); const struct ip_options_rcu *inet_opt; __be32 daddr = inet->inet_daddr; struct dst_entry *dst; struct flowi4 fl4; struct rtable *rt; rcu_read_lock(); dst = __sk_dst_get(sk); if (!dst || !dst->obsolete || dst-...
316,663,150,310,531,970,000,000,000,000,000,000,000
datagram.c
325,452,411,980,208,270,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2014-9914
Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sock...
https://nvd.nist.gov/vuln/detail/CVE-2014-9914
3,444
rawstudio
9c2cd3c93c05d009a91d84eedbb85873b0cb505d
https://github.com/rawstudio/rawstudio
https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d
Fixes insecure use of temporary file (CVE-2014-4978).
1
rs_filter_graph(RSFilter *filter) { g_return_if_fail(RS_IS_FILTER(filter)); GString *str = g_string_new("digraph G {\n"); rs_filter_graph_helper(str, filter); g_string_append_printf(str, "}\n"); g_file_set_contents("/tmp/rs-filter-graph", str->str, str->len, NULL); if (0 != system("dot -Tpng >/tmp/rs-...
20,000,396,220,013,242,000,000,000,000,000,000,000
rs-filter.c
248,284,536,212,493,870,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2014-4978
The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph.
https://nvd.nist.gov/vuln/detail/CVE-2014-4978
160,732
rawstudio
9c2cd3c93c05d009a91d84eedbb85873b0cb505d
https://github.com/rawstudio/rawstudio
https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d
Fixes insecure use of temporary file (CVE-2014-4978).
0
rs_filter_graph(RSFilter *filter) { g_return_if_fail(RS_IS_FILTER(filter)); gchar *dot_filename; gchar *png_filename; gchar *command_line; GString *str = g_string_new("digraph G {\n"); rs_filter_graph_helper(str, filter); g_string_append_printf(str, "}\n"); /* Here we would like to use g_mkdtemp(), ...
286,000,577,759,232,640,000,000,000,000,000,000,000
rs-filter.c
93,914,794,328,813,090,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2014-4978
The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph.
https://nvd.nist.gov/vuln/detail/CVE-2014-4978
3,449
FFmpeg
5aba5b89d0b1d73164d3b81764828bb8b20ff32a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/5aba5b89d0b1d73164d3b81764828bb8b20ff32a
avcodec/mpeg4videodec: Check for bitstream end in read_quant_matrix_ext() Fixes: out of array read Fixes: asff-crash-0e53d0dc491dfdd507530b66562812fbd4c36678 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static void read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb) { int i, j, v; if (get_bits1(gb)) { /* intra_quantiser_matrix */ for (i = 0; i < 64; i++) { v = get_bits(gb, 8); j = s->idsp.idct_permutation[ff_zigzag_direct[i]]; s->intra_matrix[...
213,473,736,044,128,240,000,000,000,000,000,000,000
mpeg4videodec.c
190,961,130,653,831,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-1999015
FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5a...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999015
160,737
FFmpeg
5aba5b89d0b1d73164d3b81764828bb8b20ff32a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/5aba5b89d0b1d73164d3b81764828bb8b20ff32a
avcodec/mpeg4videodec: Check for bitstream end in read_quant_matrix_ext() Fixes: out of array read Fixes: asff-crash-0e53d0dc491dfdd507530b66562812fbd4c36678 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static void read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb) static int read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb) { int i, j, v; if (get_bits1(gb)) { if (get_bits_left(gb) < 64*8) return AVERROR_INVALIDDATA; /* intra_quantiser_matrix */ for...
171,454,744,360,729,050,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-1999015
FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5a...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999015
3,450
FFmpeg
a7e032a277452366771951e29fd0bf2bd5c029f0
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a7e032a277452366771951e29fd0bf2bd5c029f0
avformat/rmdec: Do not pass mime type in rm_read_multi() to ff_rm_read_mdpr_codecdata() Fixes: use after free() Fixes: rmdec-crash-ffe85b4cab1597d1cfea6955705e53f1f5c8a362 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int rm_read_multi(AVFormatContext *s, AVIOContext *pb, AVStream *st, char *mime) { int number_of_streams = avio_rb16(pb); int number_of_mdpr; int i, ret; unsigned size2; for (i = 0; i<number_of_streams; i++) avio_rb16(pb); number_of_mdpr = avio_rb16(pb); ...
260,453,905,446,702,300,000,000,000,000,000,000,000
rmdec.c
313,294,444,812,730,200,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-1999013
FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999013
160,738
FFmpeg
a7e032a277452366771951e29fd0bf2bd5c029f0
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a7e032a277452366771951e29fd0bf2bd5c029f0
avformat/rmdec: Do not pass mime type in rm_read_multi() to ff_rm_read_mdpr_codecdata() Fixes: use after free() Fixes: rmdec-crash-ffe85b4cab1597d1cfea6955705e53f1f5c8a362 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int rm_read_multi(AVFormatContext *s, AVIOContext *pb, AVStream *st, char *mime) { int number_of_streams = avio_rb16(pb); int number_of_mdpr; int i, ret; unsigned size2; for (i = 0; i<number_of_streams; i++) avio_rb16(pb); number_of_mdpr = avio_rb16(pb); ...
59,496,157,898,063,640,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2018-1999013
FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999013
3,451
FFmpeg
9807d3976be0e92e4ece3b4b1701be894cd7c2e1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1
avformat/pva: Check for EOF before retrying in read_part_of_packet() Fixes: Infinite loop Fixes: pva-4b1835dbc2027bf3c567005dcc78e85199240d06 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int read_part_of_packet(AVFormatContext *s, int64_t *pts, int *len, int *strid, int read_packet) { AVIOContext *pb = s->pb; PVAContext *pvactx = s->priv_data; int syncword, streamid, reserved, flags, length, pts_flag; int64_t pva_pts = AV_NOPTS_VALUE, startpos; ...
82,750,978,880,669,140,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2018-1999012
FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999012
160,739
FFmpeg
9807d3976be0e92e4ece3b4b1701be894cd7c2e1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1
avformat/pva: Check for EOF before retrying in read_part_of_packet() Fixes: Infinite loop Fixes: pva-4b1835dbc2027bf3c567005dcc78e85199240d06 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int read_part_of_packet(AVFormatContext *s, int64_t *pts, int *len, int *strid, int read_packet) { AVIOContext *pb = s->pb; PVAContext *pvactx = s->priv_data; int syncword, streamid, reserved, flags, length, pts_flag; int64_t pva_pts = AV_NOPTS_VALUE, startpos; ...
183,637,118,478,417,200,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2018-1999012
FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999012
3,452
FFmpeg
2b46ebdbff1d8dec7a3d8ea280a612b91a582869
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869
avformat/asfdec_o: Check size_bmp more fully Fixes: integer overflow and out of array access Fixes: asfo-crash-46080c4341572a7137a162331af77f6ded45cbd7 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int parse_video_info(AVIOContext *pb, AVStream *st) { uint16_t size_asf; // ASF-specific Format Data size uint32_t size_bmp; // BMP_HEADER-specific Format Data size unsigned int tag; st->codecpar->width = avio_rl32(pb); st->codecpar->height = avio_rl32(pb); avio_skip(pb, 1); // skip res...
51,010,198,014,372,410,000,000,000,000,000,000,000
asfdec_o.c
216,306,402,722,308,640,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-1999011
FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999011
160,740
FFmpeg
2b46ebdbff1d8dec7a3d8ea280a612b91a582869
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869
avformat/asfdec_o: Check size_bmp more fully Fixes: integer overflow and out of array access Fixes: asfo-crash-46080c4341572a7137a162331af77f6ded45cbd7 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int parse_video_info(AVIOContext *pb, AVStream *st) { uint16_t size_asf; // ASF-specific Format Data size uint32_t size_bmp; // BMP_HEADER-specific Format Data size unsigned int tag; st->codecpar->width = avio_rl32(pb); st->codecpar->height = avio_rl32(pb); avio_skip(pb, 1); // skip res...
198,656,369,714,641,800,000,000,000,000,000,000,000
asfdec_o.c
132,474,423,002,626,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-1999011
FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999011
3,453
FFmpeg
cced03dd667a5df6df8fd40d8de0bff477ee02e8
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8
avformat/mms: Add missing chunksize check Fixes: out of array read Fixes: mms-crash-01b6c5d85f9d9f40f4e879896103e9f5b222816a Found-by: Paul Ch <paulcher@icloud.com> 1st hunk by Paul Ch <paulcher@icloud.com> Tested-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
int ff_mms_asf_header_parser(MMSContext *mms) { uint8_t *p = mms->asf_header; uint8_t *end; int flags, stream_id; mms->stream_num = 0; if (mms->asf_header_size < sizeof(ff_asf_guid) * 2 + 22 || memcmp(p, ff_asf_header, sizeof(ff_asf_guid))) { av_log(NULL, AV_LOG_ERROR, ...
10,142,334,619,194,337,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-1999010
FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5d...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999010
160,741
FFmpeg
cced03dd667a5df6df8fd40d8de0bff477ee02e8
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8
avformat/mms: Add missing chunksize check Fixes: out of array read Fixes: mms-crash-01b6c5d85f9d9f40f4e879896103e9f5b222816a Found-by: Paul Ch <paulcher@icloud.com> 1st hunk by Paul Ch <paulcher@icloud.com> Tested-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
int ff_mms_asf_header_parser(MMSContext *mms) { uint8_t *p = mms->asf_header; uint8_t *end; int flags, stream_id; mms->stream_num = 0; if (mms->asf_header_size < sizeof(ff_asf_guid) * 2 + 22 || memcmp(p, ff_asf_header, sizeof(ff_asf_guid))) { av_log(NULL, AV_LOG_ERROR, ...
87,268,627,983,556,500,000,000,000,000,000,000,000
mms.c
58,254,164,229,135,820,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-1999010
FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5d...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999010
3,454
libarchive
9c84b7426660c09c18cc349f6d70b5f8168b5680
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/9c84b7426660c09c18cc349f6d70b5f8168b5680
warc: consume data once read The warc decoder only used read ahead, it wouldn't actually consume data that had previously been printed. This means that if you specify an invalid content length, it will just reprint the same data over and over and over again until it hits the desired length. This means that a WARC res...
1
_warc_read(struct archive_read *a, const void **buf, size_t *bsz, int64_t *off) { struct warc_s *w = a->format->data; const char *rab; ssize_t nrd; if (w->cntoff >= w->cntlen) { eof: /* it's our lucky day, no work, we can leave early */ *buf = NULL; *bsz = 0U; *off = w->cntoff + 4U/*for \r\n\r\n separator...
335,908,245,050,720,980,000,000,000,000,000,000,000
archive_read_support_format_warc.c
311,131,878,398,425,230,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-1000880
libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000880
160,742
libarchive
9c84b7426660c09c18cc349f6d70b5f8168b5680
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/9c84b7426660c09c18cc349f6d70b5f8168b5680
warc: consume data once read The warc decoder only used read ahead, it wouldn't actually consume data that had previously been printed. This means that if you specify an invalid content length, it will just reprint the same data over and over and over again until it hits the desired length. This means that a WARC res...
0
_warc_read(struct archive_read *a, const void **buf, size_t *bsz, int64_t *off) { struct warc_s *w = a->format->data; const char *rab; ssize_t nrd; if (w->cntoff >= w->cntlen) { eof: /* it's our lucky day, no work, we can leave early */ *buf = NULL; *bsz = 0U; *off = w->cntoff + 4U/*for \r\n\r\n separator...
115,976,818,761,495,420,000,000,000,000,000,000,000
archive_read_support_format_warc.c
15,545,914,332,046,220,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-1000880
libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000880
3,455
libarchive
15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175
Skip 0-length ACL fields Currently, it is possible to create an archive that crashes bsdtar with a malformed ACL: Program received signal SIGSEGV, Segmentation fault. archive_acl_from_text_l (acl=<optimised out>, text=0x7e2e92 "", want_type=<optimised out>, sc=<optimised out>) at libarchive/archive_acl.c:1726 1726 ...
1
archive_acl_from_text_l(struct archive_acl *acl, const char *text, int want_type, struct archive_string_conv *sc) { struct { const char *start; const char *end; } field[6], name; const char *s, *st; int numfields, fields, n, r, sol, ret; int type, types, tag, permset, id; size_t len; char sep; switch ...
2,001,925,255,634,939,000,000,000,000,000,000,000
archive_acl.c
109,360,223,959,071,340,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-1000879
libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000879
160,743
libarchive
15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175
Skip 0-length ACL fields Currently, it is possible to create an archive that crashes bsdtar with a malformed ACL: Program received signal SIGSEGV, Segmentation fault. archive_acl_from_text_l (acl=<optimised out>, text=0x7e2e92 "", want_type=<optimised out>, sc=<optimised out>) at libarchive/archive_acl.c:1726 1726 ...
0
archive_acl_from_text_l(struct archive_acl *acl, const char *text, int want_type, struct archive_string_conv *sc) { struct { const char *start; const char *end; } field[6], name; const char *s, *st; int numfields, fields, n, r, sol, ret; int type, types, tag, permset, id; size_t len; char sep; switch ...
280,170,834,845,320,550,000,000,000,000,000,000,000
archive_acl.c
129,044,179,870,758,680,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-1000879
libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000879
3,460
FreeRDP
baee520e3dd9be6511c45a14c5f5e77784de1471
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/baee520e3dd9be6511c45a14c5f5e77784de1471
Fix for #4866: Added additional length checks
1
static UINT drdynvc_process_capability_request(drdynvcPlugin* drdynvc, int Sp, int cbChId, wStream* s) { UINT status; if (!drdynvc) return CHANNEL_RC_BAD_INIT_HANDLE; WLog_Print(drdynvc->log, WLOG_TRACE, "capability_request Sp=%d cbChId=%d", Sp, cbChId); Stream_Seek(s, 1); /* pad */ Stream_Read_U...
297,380,158,017,412,500,000,000,000,000,000,000,000
drdynvc_main.c
119,867,415,456,564,860,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-1000852
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000852
160,747
FreeRDP
baee520e3dd9be6511c45a14c5f5e77784de1471
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/baee520e3dd9be6511c45a14c5f5e77784de1471
Fix for #4866: Added additional length checks
0
static UINT drdynvc_process_capability_request(drdynvcPlugin* drdynvc, int Sp, int cbChId, wStream* s) { UINT status; if (!drdynvc) return CHANNEL_RC_BAD_INIT_HANDLE; if (Stream_GetRemainingLength(s) < 3) return ERROR_INVALID_DATA; WLog_Print(drdynvc->log, WLOG_TRACE, "capability_request Sp=%d cb...
92,932,177,092,908,920,000,000,000,000,000,000,000
drdynvc_main.c
100,953,048,662,456,420,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-1000852
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000852
3,467
minisphere
252c1ca184cb38e1acb917aa0e451c5f08519996
https://github.com/fatcerberus/minisphere
https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996
Fix integer overflow in layer_resize in map_engine.c (#268) * Fix integer overflow in layer_resize in map_engine.c There's a buffer overflow bug in the function layer_resize. It allocates a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`. But it didn't check for integer overflow, so if x_size a...
1
layer_resize(int layer, int x_size, int y_size) { int old_height; int old_width; struct map_tile* tile; int tile_width; int tile_height; struct map_tile* tilemap; struct map_trigger* trigger; struct map_zone* zone; int x, y, i; o...
25,690,879,642,748,460,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2018-1000524
miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000524
160,754
minisphere
252c1ca184cb38e1acb917aa0e451c5f08519996
https://github.com/fatcerberus/minisphere
https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996
Fix integer overflow in layer_resize in map_engine.c (#268) * Fix integer overflow in layer_resize in map_engine.c There's a buffer overflow bug in the function layer_resize. It allocates a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`. But it didn't check for integer overflow, so if x_size a...
0
layer_resize(int layer, int x_size, int y_size) { int old_height; int old_width; struct map_tile* tile; int tile_width; int tile_height; struct map_tile* tilemap; struct map_trigger* trigger; struct map_zone* zone; size_t ...
52,192,001,264,543,390,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2018-1000524
miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000524
3,469
memcached
a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
https://github.com/memcached/memcached
https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
Don't overflow item refcount on get Counts as a miss if the refcount is too high. ASCII multigets are the only time refcounts can be held for so long. doing a dirty read of refcount. is aligned. trying to avoid adding an extra refcount branch for all calls of item_get due to performance. might be able to move it in ...
1
static inline void process_get_command(conn *c, token_t *tokens, size_t ntokens, bool return_cas) { char *key; size_t nkey; int i = 0; item *it; token_t *key_token = &tokens[KEY_TOKEN]; char *suffix; assert(c != NULL); do { while(key_token->length != 0) { key = ke...
185,526,984,390,699,900,000,000,000,000,000,000,000
memcached.c
302,848,843,381,355,740,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-1000127
memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000127
160,756
memcached
a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
https://github.com/memcached/memcached
https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
Don't overflow item refcount on get Counts as a miss if the refcount is too high. ASCII multigets are the only time refcounts can be held for so long. doing a dirty read of refcount. is aligned. trying to avoid adding an extra refcount branch for all calls of item_get due to performance. might be able to move it in ...
0
static inline void process_get_command(conn *c, token_t *tokens, size_t ntokens, bool return_cas) { char *key; size_t nkey; int i = 0; item *it; token_t *key_token = &tokens[KEY_TOKEN]; char *suffix; assert(c != NULL); do { while(key_token->length != 0) { key = ke...
219,291,383,614,045,600,000,000,000,000,000,000,000
memcached.c
131,507,844,729,028,670,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-1000127
memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000127
3,476
libxsmm
151481489192e6d1997f8bde52c5c425ea41741d
https://github.com/hfp/libxsmm
https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d
Issue #287: made CSR/CSC readers more robust against invalid input (case #1).
1
void libxsmm_sparse_csc_reader( libxsmm_generated_code* io_generated_code, const char* i_csc_file_in, unsigned int** o_row_idx, unsigned int** o_column_idx, doubl...
58,824,011,372,759,270,000,000,000,000,000,000,000
generator_spgemm_csc_reader.c
118,932,308,961,341,520,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20542
There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c (function libxsmm_sparse_csc_reader) in LIBXSMM 1.10, a different vulnerability than CVE-2018-20541 (which is in a different part of the source code and is seen at a different address).
https://nvd.nist.gov/vuln/detail/CVE-2018-20542
160,762
libxsmm
151481489192e6d1997f8bde52c5c425ea41741d
https://github.com/hfp/libxsmm
https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d
Issue #287: made CSR/CSC readers more robust against invalid input (case #1).
0
void libxsmm_sparse_csc_reader( libxsmm_generated_code* io_generated_code, const char* i_csc_file_in, unsigned int** o_row_idx, unsigned int** o_column_idx, doubl...
300,759,623,763,847,900,000,000,000,000,000,000,000
generator_spgemm_csc_reader.c
172,382,550,039,566,160,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20542
There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c (function libxsmm_sparse_csc_reader) in LIBXSMM 1.10, a different vulnerability than CVE-2018-20541 (which is in a different part of the source code and is seen at a different address).
https://nvd.nist.gov/vuln/detail/CVE-2018-20542
3,478
linux
9824dfae5741275473a23a7ed5756c7b6efacc9d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d
net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT Fields ->dev and ->next of struct ipddp_route may be copied to userspace on the SIOCFINDIPDDPRT ioctl. This is only accessible to CAP_NET_ADMIN though. Let's manually copy the relevant fields instead of using memcpy(). BugLink: http://blog.infosect...
1
static int ipddp_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) { struct ipddp_route __user *rt = ifr->ifr_data; struct ipddp_route rcp, rcp2, *rp; if(!capable(CAP_NET_ADMIN)) return -EPERM; if(copy_from_user(&rcp, rt, sizeof(rcp))) return -EFAULT; switch...
248,089,498,899,169,800,000,000,000,000,000,000,000
ipddp.c
149,960,990,739,195,910,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20511
An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2018-20511
160,764
linux
9824dfae5741275473a23a7ed5756c7b6efacc9d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d
net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT Fields ->dev and ->next of struct ipddp_route may be copied to userspace on the SIOCFINDIPDDPRT ioctl. This is only accessible to CAP_NET_ADMIN though. Let's manually copy the relevant fields instead of using memcpy(). BugLink: http://blog.infosect...
0
static int ipddp_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) { struct ipddp_route __user *rt = ifr->ifr_data; struct ipddp_route rcp, rcp2, *rp; if(!capable(CAP_NET_ADMIN)) return -EPERM; if(copy_from_user(&rcp, rt, sizeof(rcp))) return -EFAULT; switch...
101,011,372,955,699,140,000,000,000,000,000,000,000
ipddp.c
193,193,809,780,971,200,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20511
An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2018-20511
3,479
ImageMagick
db0add932fb850d762b02604ca3053b7d7ab6deb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb
Prevent infinite loop
1
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; Quantum index; register Quantum *q; register ssize_t i,...
272,939,187,823,507,500,000,000,000,000,000,000,000
bmp.c
314,845,857,041,993,600,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20467
In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20467
160,765
ImageMagick
db0add932fb850d762b02604ca3053b7d7ab6deb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb
Prevent infinite loop
0
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; Quantum index; register Quantum *q; register ssize_t i,...
320,469,407,266,324,500,000,000,000,000,000,000,000
bmp.c
124,312,222,839,230,660,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20467
In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20467
3,486
mosquitto
9097577b49b7fdcf45d30975976dd93808ccc0c4
https://github.com/eclipse/mosquitto
https://github.com/eclipse/mosquitto/commit/9097577b49b7fdcf45d30975976dd93808ccc0c4
Fix acl_file being ignore for default listener if with per_listener_settings Close #1073. Thanks to Jef Driesen. Bug: https://github.com/eclipse/mosquitto/issues/1073
1
int config__parse_args(struct mosquitto_db *db, struct mosquitto__config *config, int argc, char *argv[]) { int i; int port_tmp; for(i=1; i<argc; i++){ if(!strcmp(argv[i], "-c") || !strcmp(argv[i], "--config-file")){ if(i<argc-1){ db->config_file = argv[i+1]; if(config__read(db, config, false)){ ...
173,901,566,023,283,400,000,000,000,000,000,000,000
conf.c
218,142,261,545,231,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20145
Eclipse Mosquitto 1.5.x before 1.5.5 allows ACL bypass: if the option per_listener_settings was set to true, and the default listener was in use, and the default listener specified an acl_file, then the acl file was being ignored.
https://nvd.nist.gov/vuln/detail/CVE-2018-20145
160,773
mosquitto
9097577b49b7fdcf45d30975976dd93808ccc0c4
https://github.com/eclipse/mosquitto
https://github.com/eclipse/mosquitto/commit/9097577b49b7fdcf45d30975976dd93808ccc0c4
Fix acl_file being ignore for default listener if with per_listener_settings Close #1073. Thanks to Jef Driesen. Bug: https://github.com/eclipse/mosquitto/issues/1073
0
int config__parse_args(struct mosquitto_db *db, struct mosquitto__config *config, int argc, char *argv[]) { int i; int port_tmp; for(i=1; i<argc; i++){ if(!strcmp(argv[i], "-c") || !strcmp(argv[i], "--config-file")){ if(i<argc-1){ db->config_file = argv[i+1]; if(config__read(db, config, false)){ ...
155,911,273,468,250,070,000,000,000,000,000,000,000
conf.c
250,299,779,528,574,900,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20145
Eclipse Mosquitto 1.5.x before 1.5.5 allows ACL bypass: if the option per_listener_settings was set to true, and the default listener was in use, and the default listener specified an acl_file, then the acl file was being ignored.
https://nvd.nist.gov/vuln/detail/CVE-2018-20145
3,492
linux
f43f39958beb206b53292801e216d9b8a660f087
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087
crypto: user - fix leaking uninitialized memory to userspace All bytes of the NETLINK_CRYPTO report structures must be initialized, since they are copied to userspace. The change from strncpy() to strlcpy() broke this. As a minimal fix, change it back. Fixes: 4473710df1f8 ("crypto: user - Prepare for CRYPTO_MAX_ALG...
1
static int crypto_report_one(struct crypto_alg *alg, struct crypto_user_alg *ualg, struct sk_buff *skb) { strlcpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name)); strlcpy(ualg->cru_driver_name, alg->cra_driver_name, sizeof(ualg->cru_driver_name)); strlcpy(ualg->cru_module_name, module_name(alg->...
285,899,801,669,781,700,000,000,000,000,000,000,000
crypto_user_base.c
192,031,452,937,307,500,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-19854
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regressio...
https://nvd.nist.gov/vuln/detail/CVE-2018-19854
160,777
linux
f43f39958beb206b53292801e216d9b8a660f087
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087
crypto: user - fix leaking uninitialized memory to userspace All bytes of the NETLINK_CRYPTO report structures must be initialized, since they are copied to userspace. The change from strncpy() to strlcpy() broke this. As a minimal fix, change it back. Fixes: 4473710df1f8 ("crypto: user - Prepare for CRYPTO_MAX_ALG...
0
static int crypto_report_one(struct crypto_alg *alg, struct crypto_user_alg *ualg, struct sk_buff *skb) { strncpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name)); strncpy(ualg->cru_driver_name, alg->cra_driver_name, sizeof(ualg->cru_driver_name)); strncpy(ualg->cru_module_name, module_name(alg->...
10,761,980,265,396,460,000,000,000,000,000,000,000
crypto_user_base.c
42,538,118,092,002,900,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-19854
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regressio...
https://nvd.nist.gov/vuln/detail/CVE-2018-19854
3,493
WavPack
bba5389dc598a92bdf2b297c3ea34620b6679b5b
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b
issue #54: fix potential out-of-bounds heap read
1
int WavpackVerifySingleBlock (unsigned char *buffer, int verify_checksum) { WavpackHeader *wphdr = (WavpackHeader *) buffer; uint32_t checksum_passed = 0, bcount, meta_bc; unsigned char *dp, meta_id, c1, c2; if (strncmp (wphdr->ckID, "wvpk", 4) || wphdr->ckSize + 8 < sizeof (WavpackHeader)) ret...
272,130,961,827,911,630,000,000,000,000,000,000,000
open_utils.c
309,449,084,172,843,070,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19841
The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
https://nvd.nist.gov/vuln/detail/CVE-2018-19841
160,779
WavPack
bba5389dc598a92bdf2b297c3ea34620b6679b5b
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b
issue #54: fix potential out-of-bounds heap read
0
int WavpackVerifySingleBlock (unsigned char *buffer, int verify_checksum) { WavpackHeader *wphdr = (WavpackHeader *) buffer; uint32_t checksum_passed = 0, bcount, meta_bc; unsigned char *dp, meta_id, c1, c2; if (strncmp (wphdr->ckID, "wvpk", 4) || wphdr->ckSize + 8 < sizeof (WavpackHeader)) ret...
149,541,977,340,175,770,000,000,000,000,000,000,000
open_utils.c
252,907,153,773,764,460,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19841
The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
https://nvd.nist.gov/vuln/detail/CVE-2018-19841
3,495
sleuthkit
bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d
https://github.com/sleuthkit/sleuthkit
https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d
Merge pull request #1374 from JordyZomer/develop Fix CVE-2018-19497.
1
hfs_cat_traverse(HFS_INFO * hfs, TSK_HFS_BTREE_CB a_cb, void *ptr) { TSK_FS_INFO *fs = &(hfs->fs_info); uint32_t cur_node; /* node id of the current node */ char *node; uint16_t nodesize; uint8_t is_done = 0; tsk_error_reset(); nodesize = tsk_getu16(fs->endian, hfs->catalog_h...
217,046,689,785,223,500,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-19497
In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
https://nvd.nist.gov/vuln/detail/CVE-2018-19497
160,782
sleuthkit
bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d
https://github.com/sleuthkit/sleuthkit
https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d
Merge pull request #1374 from JordyZomer/develop Fix CVE-2018-19497.
0
hfs_cat_traverse(HFS_INFO * hfs, TSK_HFS_BTREE_CB a_cb, void *ptr) { TSK_FS_INFO *fs = &(hfs->fs_info); uint32_t cur_node; /* node id of the current node */ char *node; uint16_t nodesize; uint8_t is_done = 0; tsk_error_reset(); nodesize = tsk_getu16(fs->endian, hfs->catalog_h...
24,559,104,691,834,250,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-19497
In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
https://nvd.nist.gov/vuln/detail/CVE-2018-19497
3,496
uriparser
f76275d4a91b28d687250525d3a0c5509bbd666f
https://github.com/uriparser/uriparser
https://github.com/uriparser/uriparser/commit/f76275d4a91b28d687250525d3a0c5509bbd666f
UriQuery.c: Catch integer overflow in ComposeQuery and ...Ex
1
int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest, const URI_TYPE(QueryList) * queryList, int maxChars, int * charsWritten, int * charsRequired, UriBool spaceToPlus, UriBool normalizeBreaks) { UriBool firstItem = URI_TRUE; int ampersandLen = 0; /* increased to 1 from second item on */ URI_CHAR * write = dest; ...
35,761,845,554,934,990,000,000,000,000,000,000,000
UriQuery.c
250,998,275,312,918,000,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-19199
An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an integer overflow via a uriComposeQuery* or uriComposeQueryEx* function because of an unchecked multiplication.
https://nvd.nist.gov/vuln/detail/CVE-2018-19199
160,783
uriparser
f76275d4a91b28d687250525d3a0c5509bbd666f
https://github.com/uriparser/uriparser
https://github.com/uriparser/uriparser/commit/f76275d4a91b28d687250525d3a0c5509bbd666f
UriQuery.c: Catch integer overflow in ComposeQuery and ...Ex
0
int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest, const URI_TYPE(QueryList) * queryList, int maxChars, int * charsWritten, int * charsRequired, UriBool spaceToPlus, UriBool normalizeBreaks) { UriBool firstItem = URI_TRUE; int ampersandLen = 0; /* increased to 1 from second item on */ URI_CHAR * write = dest; ...
102,820,611,669,811,440,000,000,000,000,000,000,000
UriQuery.c
248,766,432,489,047,470,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-19199
An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an integer overflow via a uriComposeQuery* or uriComposeQueryEx* function because of an unchecked multiplication.
https://nvd.nist.gov/vuln/detail/CVE-2018-19199
3,497
uriparser
864f5d4c127def386dd5cc926ad96934b297f04e
https://github.com/uriparser/uriparser
https://github.com/uriparser/uriparser/commit/864f5d4c127def386dd5cc926ad96934b297f04e
UriQuery.c: Fix out-of-bounds-write in ComposeQuery and ...Ex Reported by Google Autofuzz team
1
int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest, const URI_TYPE(QueryList) * queryList, int maxChars, int * charsWritten, int * charsRequired, UriBool spaceToPlus, UriBool normalizeBreaks) { UriBool firstItem = URI_TRUE; int ampersandLen = 0; /* increased to 1 from second item on */ URI_CHAR * write = dest; ...
110,870,270,092,081,400,000,000,000,000,000,000,000
UriQuery.c
228,924,076,332,498,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-19198
An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or uriComposeQueryEx* function because the '&' character is mishandled in certain contexts.
https://nvd.nist.gov/vuln/detail/CVE-2018-19198
160,784
uriparser
864f5d4c127def386dd5cc926ad96934b297f04e
https://github.com/uriparser/uriparser
https://github.com/uriparser/uriparser/commit/864f5d4c127def386dd5cc926ad96934b297f04e
UriQuery.c: Fix out-of-bounds-write in ComposeQuery and ...Ex Reported by Google Autofuzz team
0
int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest, const URI_TYPE(QueryList) * queryList, int maxChars, int * charsWritten, int * charsRequired, UriBool spaceToPlus, UriBool normalizeBreaks) { UriBool firstItem = URI_TRUE; int ampersandLen = 0; /* increased to 1 from second item on */ URI_CHAR * write = dest; ...
275,676,797,792,352,340,000,000,000,000,000,000,000
UriQuery.c
82,019,785,952,299,370,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-19198
An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or uriComposeQueryEx* function because the '&' character is mishandled in certain contexts.
https://nvd.nist.gov/vuln/detail/CVE-2018-19198
3,499
keepalived
f28015671a4b04785859d1b4b1327b367b6a10e9
https://github.com/acassen/keepalived
https://github.com/acassen/keepalived/commit/f28015671a4b04785859d1b4b1327b367b6a10e9
Fix buffer overflow in extract_status_code() Issue #960 identified that the buffer allocated for copying the HTTP status code could overflow if the http response was corrupted. This commit changes the way the status code is read, avoids copying data, and also ensures that the status code is three digits long, is non-...
1
int extract_status_code(char *buffer, size_t size) { char *buf_code; char *begin; char *end = buffer + size; size_t inc = 0; int code; /* Allocate the room */ buf_code = (char *)MALLOC(10); /* Status-Code extraction */ while (buffer < end && *buffer++ != ' ') ; begin = buffer; while (buffer < end && *b...
63,080,800,693,476,370,000,000,000,000,000,000,000
html.c
230,836,095,768,403,100,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-19115
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
https://nvd.nist.gov/vuln/detail/CVE-2018-19115
160,786
keepalived
f28015671a4b04785859d1b4b1327b367b6a10e9
https://github.com/acassen/keepalived
https://github.com/acassen/keepalived/commit/f28015671a4b04785859d1b4b1327b367b6a10e9
Fix buffer overflow in extract_status_code() Issue #960 identified that the buffer allocated for copying the HTTP status code could overflow if the http response was corrupted. This commit changes the way the status code is read, avoids copying data, and also ensures that the status code is three digits long, is non-...
0
int extract_status_code(char *buffer, size_t size) { char *end = buffer + size; unsigned long code; /* Status-Code extraction */ while (buffer < end && *buffer != ' ' && *buffer != '\r') buffer++; buffer++; if (buffer + 3 >= end || *buffer == ' ' || buffer[3] != ' ') return 0; code = strtoul(buffer, &e...
199,892,831,451,230,800,000,000,000,000,000,000,000
html.c
224,425,627,547,513,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-19115
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
https://nvd.nist.gov/vuln/detail/CVE-2018-19115
3,500
lighttpd1.4
2105dae0f9d7a964375ce681e53cb165375f84c1
https://github.com/lighttpd/lighttpd1.4
https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1
[mod_alias] security: potential path traversal with specific configs Security: potential path traversal of a single directory above the alias target with a specific mod_alias config where the alias which is matched does not end in '/', but alias target filesystem path does end in '/'. e.g. server.docroot = "/srv/www/...
1
PHYSICALPATH_FUNC(mod_alias_physical_handler) { plugin_data *p = p_d; int uri_len, basedir_len; char *uri_ptr; size_t k; if (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON; mod_alias_patch_connection(srv, con, p); /* not to include the tailing slash */ basedir_len = buffer_string_length(con->physi...
56,562,215,835,898,430,000,000,000,000,000,000,000
mod_alias.c
99,393,277,811,407,030,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-19052
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does hav...
https://nvd.nist.gov/vuln/detail/CVE-2018-19052
160,787
lighttpd1.4
2105dae0f9d7a964375ce681e53cb165375f84c1
https://github.com/lighttpd/lighttpd1.4
https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1
[mod_alias] security: potential path traversal with specific configs Security: potential path traversal of a single directory above the alias target with a specific mod_alias config where the alias which is matched does not end in '/', but alias target filesystem path does end in '/'. e.g. server.docroot = "/srv/www/...
0
PHYSICALPATH_FUNC(mod_alias_physical_handler) { plugin_data *p = p_d; int uri_len, basedir_len; char *uri_ptr; size_t k; if (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON; mod_alias_patch_connection(srv, con, p); /* not to include the tailing slash */ basedir_len = buffer_string_length(con->physi...
56,507,838,194,928,160,000,000,000,000,000,000,000
mod_alias.c
3,521,148,212,204,517,500,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-19052
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does hav...
https://nvd.nist.gov/vuln/detail/CVE-2018-19052
3,518
linux
d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
userns: also map extents in the reverse map to kernel IDs The current logic first clones the extent array and sorts both copies, then maps the lower IDs of the forward mapping into the lower namespace, but doesn't map the lower IDs of the reverse mapping. This means that code in a nested user namespace with >5 extent...
1
static ssize_t map_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos, int cap_setid, struct uid_gid_map *map, struct uid_gid_map *parent_map) { struct seq_file *seq = file->private_data; struct user_namespace *ns = seq->private; struct uid_gid_map new_map; unsigned idx; st...
254,509,644,118,020,100,000,000,000,000,000,000,000
user_namespace.c
68,584,570,552,716,830,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-18955
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the name...
https://nvd.nist.gov/vuln/detail/CVE-2018-18955