idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
194,906
redis
9fdcc15962f9ff4baebe6fdd947816f43f730d50
https://github.com/antirez/redis
https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50
Security: fix redis-cli buffer overflow. Thanks to Fakhri Zulkifli for reporting it. The fix switched to dynamic allocation, copying the final prompt in the static buffer only at the end.
0
static void cliRefreshPrompt(void) { if (config.eval_ldb) return; sds prompt = sdsempty(); if (config.hostsocket != NULL) { prompt = sdscatfmt(prompt,"redis %s",config.hostsocket); } else { char addr[256]; anetFormatAddr(addr, sizeof(addr), config.hostip, config.hostport); ...
213,354,082,345,114,820,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-12326
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument fro...
https://nvd.nist.gov/vuln/detail/CVE-2018-12326
10,600
PDFGen
ee58aff6918b8bbc3be29b9e3089485ea46ff956
https://github.com/AndreRenaud/PDFGen
https://github.com/AndreRenaud/PDFGen/commit/ee58aff6918b8bbc3be29b9e3089485ea46ff956
jpeg: Fix another possible buffer overrun Found via the clang libfuzzer
1
static int jpeg_size(unsigned char* data, unsigned int data_size, int *width, int *height) { int i = 0; if (i + 3 < data_size && data[i] == 0xFF && data[i+1] == 0xD8 && data[i+2] == 0xFF && data[i+3] == 0xE0) { i += 4; if(i + 6 < data_size && data...
283,638,409,723,498,760,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-11363
jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read.
https://nvd.nist.gov/vuln/detail/CVE-2018-11363
194,907
PDFGen
ee58aff6918b8bbc3be29b9e3089485ea46ff956
https://github.com/AndreRenaud/PDFGen
https://github.com/AndreRenaud/PDFGen/commit/ee58aff6918b8bbc3be29b9e3089485ea46ff956
jpeg: Fix another possible buffer overrun Found via the clang libfuzzer
0
static int jpeg_size(unsigned char* data, unsigned int data_size, int *width, int *height) { int i = 0; if (i + 3 < data_size && data[i] == 0xFF && data[i+1] == 0xD8 && data[i+2] == 0xFF && data[i+3] == 0xE0) { i += 4; if(i + 6 < data_size && data...
113,437,429,362,435,460,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-11363
jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read.
https://nvd.nist.gov/vuln/detail/CVE-2018-11363
10,601
redis
e89086e09a38cc6713bcd4b9c29abf92cf393936
https://github.com/antirez/redis
https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936
Security: fix Lua struct package offset handling. After the first fix to the struct package I found another similar problem, which is fixed by this patch. It could be reproduced easily by running the following script: return struct.unpack('f', "xxxxxxxxxxxxx",-3) The above will access bytes before the 'data' poi...
1
static int b_unpack (lua_State *L) { Header h; const char *fmt = luaL_checkstring(L, 1); size_t ld; const char *data = luaL_checklstring(L, 2, &ld); size_t pos = luaL_optinteger(L, 3, 1) - 1; int n = 0; /* number of results */ defaultoptions(&h); while (*fmt) { int opt = *fmt++; size_t ...
173,966,888,912,004,300,000,000,000,000,000,000,000
lua_struct.c
181,615,881,789,836,040,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-11219
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
https://nvd.nist.gov/vuln/detail/CVE-2018-11219
194,908
redis
e89086e09a38cc6713bcd4b9c29abf92cf393936
https://github.com/antirez/redis
https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936
Security: fix Lua struct package offset handling. After the first fix to the struct package I found another similar problem, which is fixed by this patch. It could be reproduced easily by running the following script: return struct.unpack('f', "xxxxxxxxxxxxx",-3) The above will access bytes before the 'data' poi...
0
static int b_unpack (lua_State *L) { Header h; const char *fmt = luaL_checkstring(L, 1); size_t ld; const char *data = luaL_checklstring(L, 2, &ld); size_t pos = luaL_optinteger(L, 3, 1); luaL_argcheck(L, pos > 0, 3, "offset must be 1 or greater"); pos--; /* Lua indexes are 1-based, but here we want 0-...
258,237,763,990,239,040,000,000,000,000,000,000,000
lua_struct.c
266,137,065,157,491,940,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-11219
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
https://nvd.nist.gov/vuln/detail/CVE-2018-11219
10,607
openmpt
492022c7297ede682161d9c0ec2de15526424e76
https://github.com/OpenMPT/openmpt
https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76
None
1
std::vector<GetLengthType> CSoundFile::GetLength(enmGetLengthResetMode adjustMode, GetLengthTarget target) { std::vector<GetLengthType> results; GetLengthType retval; retval.startOrder = target.startOrder; retval.startRow = target.startRow; const bool hasSearchTarget = target.mode != GetLengthTarget::NoTarget; c...
139,424,168,971,208,380,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-10017
soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before 0.3.8 allows remote attackers to cause a denial of service (out-of-bounds read) via an IT or MO3 file with many nested pattern loops.
https://nvd.nist.gov/vuln/detail/CVE-2018-10017
194,914
openmpt
492022c7297ede682161d9c0ec2de15526424e76
https://github.com/OpenMPT/openmpt
https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76
None
0
std::vector<GetLengthType> CSoundFile::GetLength(enmGetLengthResetMode adjustMode, GetLengthTarget target) { std::vector<GetLengthType> results; GetLengthType retval; retval.startOrder = target.startOrder; retval.startRow = target.startRow; const bool hasSearchTarget = target.mode != GetLengthTarget::NoTarget; c...
38,966,371,194,494,637,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-10017
soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before 0.3.8 allows remote attackers to cause a denial of service (out-of-bounds read) via an IT or MO3 file with many nested pattern loops.
https://nvd.nist.gov/vuln/detail/CVE-2018-10017
10,608
libevt
444ca3ce7853538c577e0ec3f6146d2d65780734
https://github.com/libyal/libevt
https://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734
None
1
int libevt_record_values_read_event( libevt_record_values_t *record_values, uint8_t *record_data, size_t record_data_size, uint8_t strict_mode, libcerror_error_t **error ) { static char *function = "libevt_record_values_read_event"; size_t record_data_offset = 0; size_t strings_data_of...
288,479,666,967,874,900,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-8754
The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub
https://nvd.nist.gov/vuln/detail/CVE-2018-8754
194,915
libevt
444ca3ce7853538c577e0ec3f6146d2d65780734
https://github.com/libyal/libevt
https://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734
None
0
int libevt_record_values_read_event( libevt_record_values_t *record_values, uint8_t *record_data, size_t record_data_size, uint8_t strict_mode, libcerror_error_t **error ) { static char *function = "libevt_record_values_read_event"; size_t record_data_offset = 0; size_t strings_data_of...
132,649,440,970,874,600,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-8754
The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub
https://nvd.nist.gov/vuln/detail/CVE-2018-8754
10,616
gifsicle
118a46090c50829dc543179019e6140e1235f909
https://github.com/kohler/gifsicle
https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909
gif_read: Set last_name = NULL unconditionally. With a non-malicious GIF, last_name is set to NULL when a name extension is followed by an image. Reported in #117, via Debian, via a KAIST fuzzing program.
1
read_gif(Gif_Reader *grr, int read_flags, const char* landmark, Gif_ReadErrorHandler handler) { Gif_Stream *gfs; Gif_Image *gfi; Gif_Context gfc; int unknown_block_type = 0; if (gifgetc(grr) != 'G' || gifgetc(grr) != 'I' || gifgetc(grr) != 'F') return 0; (void)gifgetc(grr); (void)gifget...
145,328,850,450,328,550,000,000,000,000,000,000,000
gifread.c
329,987,187,594,896,880,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18120
A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421.
https://nvd.nist.gov/vuln/detail/CVE-2017-18120
194,923
gifsicle
118a46090c50829dc543179019e6140e1235f909
https://github.com/kohler/gifsicle
https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909
gif_read: Set last_name = NULL unconditionally. With a non-malicious GIF, last_name is set to NULL when a name extension is followed by an image. Reported in #117, via Debian, via a KAIST fuzzing program.
0
read_gif(Gif_Reader *grr, int read_flags, const char* landmark, Gif_ReadErrorHandler handler) { Gif_Stream *gfs; Gif_Image *gfi; Gif_Context gfc; int unknown_block_type = 0; if (gifgetc(grr) != 'G' || gifgetc(grr) != 'I' || gifgetc(grr) != 'F') return 0; (void)gifgetc(grr); (void)gifget...
219,899,033,143,943,050,000,000,000,000,000,000,000
gifread.c
127,741,728,004,191,690,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18120
A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421.
https://nvd.nist.gov/vuln/detail/CVE-2017-18120
10,617
rpm
c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
Make verification match the new restricted directory symlink behavior Only follow directory symlinks owned by target directory owner or root during verification to match the behavior of fsmVerify() in the new CVE-2017-7500 world order. The code is klunkier than it should and the logic should use common code with fsmV...
1
rpmVerifyAttrs rpmfilesVerify(rpmfiles fi, int ix, rpmVerifyAttrs omitMask) { rpm_mode_t fmode = rpmfilesFMode(fi, ix); rpmfileAttrs fileAttrs = rpmfilesFFlags(fi, ix); rpmVerifyAttrs flags = rpmfilesVFlags(fi, ix); const char * fn = rpmfilesFN(fi, ix); struct stat sb; rpmVerifyAttrs vfy = RPMVE...
253,992,275,898,542,300,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2017-7500
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory...
https://nvd.nist.gov/vuln/detail/CVE-2017-7500
194,924
rpm
c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
Make verification match the new restricted directory symlink behavior Only follow directory symlinks owned by target directory owner or root during verification to match the behavior of fsmVerify() in the new CVE-2017-7500 world order. The code is klunkier than it should and the logic should use common code with fsmV...
0
rpmVerifyAttrs rpmfilesVerify(rpmfiles fi, int ix, rpmVerifyAttrs omitMask) { rpm_mode_t fmode = rpmfilesFMode(fi, ix); rpmfileAttrs fileAttrs = rpmfilesFFlags(fi, ix); rpmVerifyAttrs flags = rpmfilesVFlags(fi, ix); const char * fn = rpmfilesFN(fi, ix); struct stat sb; rpmVerifyAttrs vfy = RPMVE...
157,745,764,923,260,070,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2017-7500
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory...
https://nvd.nist.gov/vuln/detail/CVE-2017-7500
10,625
optee_os
7e768f8a473409215fe3fff8f6e31f8a3a0103c6
https://github.com/OP-TEE/optee_os
https://github.com/OP-TEE/optee_os/commit/7e768f8a473409215fe3fff8f6e31f8a3a0103c6
core: clear the entire TA area Previously we cleared (memset to zero) the size corresponding to code and data segments, however the allocation for the TA is made on the granularity of the memory pool, meaning that we did not clear all memory and because of that we could potentially leak code and data of a previous loa...
1
static struct mobj *alloc_ta_mem(size_t size) { #ifdef CFG_PAGED_USER_TA return mobj_paged_alloc(size); #else struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr); if (mobj) memset(mobj_get_va(mobj, 0), 0, size); return mobj; #endif }
333,142,874,986,827,700,000,000,000,000,000,000,000
user_ta.c
248,720,455,099,418,000,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2019-1010294
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later.
https://nvd.nist.gov/vuln/detail/CVE-2019-1010294
194,929
optee_os
7e768f8a473409215fe3fff8f6e31f8a3a0103c6
https://github.com/OP-TEE/optee_os
https://github.com/OP-TEE/optee_os/commit/7e768f8a473409215fe3fff8f6e31f8a3a0103c6
core: clear the entire TA area Previously we cleared (memset to zero) the size corresponding to code and data segments, however the allocation for the TA is made on the granularity of the memory pool, meaning that we did not clear all memory and because of that we could potentially leak code and data of a previous loa...
0
static struct mobj *alloc_ta_mem(size_t size) { #ifdef CFG_PAGED_USER_TA return mobj_paged_alloc(size); #else struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr); if (mobj) { size_t granularity = BIT(tee_mm_sec_ddr.shift); /* Round up to allocation granularity size */ memset(mobj_get_va...
98,628,311,870,220,710,000,000,000,000,000,000,000
user_ta.c
100,472,334,477,367,580,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2019-1010294
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later.
https://nvd.nist.gov/vuln/detail/CVE-2019-1010294
10,626
optee_os
95f36d661f2b75887772ea28baaad904bde96970
https://github.com/OP-TEE/optee_os
https://github.com/OP-TEE/optee_os/commit/95f36d661f2b75887772ea28baaad904bde96970
core: tee_mmu_check_access_rights() check all pages Prior to this patch tee_mmu_check_access_rights() checks an address in each page of a supplied range. If both the start and length of that range is unaligned the last page in the range is sometimes not checked. With this patch the first address of each page in the ra...
1
TEE_Result tee_mmu_check_access_rights(const struct user_ta_ctx *utc, uint32_t flags, uaddr_t uaddr, size_t len) { uaddr_t a; size_t addr_incr = MIN(CORE_MMU_USER_CODE_SIZE, CORE_MMU_USER_PARAM_SIZE); if (ADD_OVERFLOW(uaddr, len, &a)) return TEE_ERROR_ACCESS_DENIED; if (...
309,046,461,438,464,900,000,000,000,000,000,000,000
tee_mmu.c
177,418,137,153,567,150,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010293
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Boundary crossing. The impact is: Memory corruption of the TEE itself. The component is: optee_os. The fixed version is: 3.4.0 and later.
https://nvd.nist.gov/vuln/detail/CVE-2019-1010293
194,930
optee_os
95f36d661f2b75887772ea28baaad904bde96970
https://github.com/OP-TEE/optee_os
https://github.com/OP-TEE/optee_os/commit/95f36d661f2b75887772ea28baaad904bde96970
core: tee_mmu_check_access_rights() check all pages Prior to this patch tee_mmu_check_access_rights() checks an address in each page of a supplied range. If both the start and length of that range is unaligned the last page in the range is sometimes not checked. With this patch the first address of each page in the ra...
0
TEE_Result tee_mmu_check_access_rights(const struct user_ta_ctx *utc, uint32_t flags, uaddr_t uaddr, size_t len) { uaddr_t a; uaddr_t end_addr = 0; size_t addr_incr = MIN(CORE_MMU_USER_CODE_SIZE, CORE_MMU_USER_PARAM_SIZE); if (ADD_OVERFLOW(uaddr, len, &end_addr)) return TEE...
305,359,928,372,886,040,000,000,000,000,000,000,000
tee_mmu.c
278,891,687,540,339,400,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010293
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Boundary crossing. The impact is: Memory corruption of the TEE itself. The component is: optee_os. The fixed version is: 3.4.0 and later.
https://nvd.nist.gov/vuln/detail/CVE-2019-1010293
10,627
optee_os
e3adcf566cb278444830e7badfdcc3983e334fd1
https://github.com/OP-TEE/optee_os
https://github.com/OP-TEE/optee_os/commit/e3adcf566cb278444830e7badfdcc3983e334fd1
core: ensure that supplied range matches MOBJ In set_rmem_param() if the MOBJ is found by the cookie it's verified to represent non-secure shared memory. Prior to this patch the supplied sub-range to be used of the MOBJ was not checked here and relied on later checks further down the chain. Those checks seems to be en...
1
static TEE_Result set_rmem_param(const struct optee_msg_param_rmem *rmem, struct param_mem *mem) { uint64_t shm_ref = READ_ONCE(rmem->shm_ref); mem->mobj = mobj_reg_shm_get_by_cookie(shm_ref); if (!mem->mobj) return TEE_ERROR_BAD_PARAMETERS; mem->offs = READ_ONCE(rmem->offs); mem->size = READ_ONCE...
15,438,417,749,328,557,000,000,000,000,000,000,000
entry_std.c
253,309,200,136,308,440,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-1010292
Linaro/OP-TEE OP-TEE Prior to version v3.4.0 is affected by: Boundary checks. The impact is: This could lead to corruption of any memory which the TA can access. The component is: optee_os. The fixed version is: v3.4.0.
https://nvd.nist.gov/vuln/detail/CVE-2019-1010292
194,931
optee_os
e3adcf566cb278444830e7badfdcc3983e334fd1
https://github.com/OP-TEE/optee_os
https://github.com/OP-TEE/optee_os/commit/e3adcf566cb278444830e7badfdcc3983e334fd1
core: ensure that supplied range matches MOBJ In set_rmem_param() if the MOBJ is found by the cookie it's verified to represent non-secure shared memory. Prior to this patch the supplied sub-range to be used of the MOBJ was not checked here and relied on later checks further down the chain. Those checks seems to be en...
0
static TEE_Result set_rmem_param(const struct optee_msg_param_rmem *rmem, struct param_mem *mem) { size_t req_size = 0; uint64_t shm_ref = READ_ONCE(rmem->shm_ref); mem->mobj = mobj_reg_shm_get_by_cookie(shm_ref); if (!mem->mobj) return TEE_ERROR_BAD_PARAMETERS; mem->offs = READ_ONCE(rmem->offs); ...
149,717,132,743,521,740,000,000,000,000,000,000,000
entry_std.c
222,676,104,212,434,780,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-1010292
Linaro/OP-TEE OP-TEE Prior to version v3.4.0 is affected by: Boundary checks. The impact is: This could lead to corruption of any memory which the TA can access. The component is: optee_os. The fixed version is: v3.4.0.
https://nvd.nist.gov/vuln/detail/CVE-2019-1010292
10,628
openmpt
927688ddab43c2b203569de79407a899e734fabe
https://github.com/OpenMPT/openmpt
https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe
[Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff...
1
LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff) { const char* str; unsigned int retval; size_t tmpretval; if(!file) return 0; str = openmpt_module_get_instrument_name(file->mod,qual-1); if(!str){ if(buff){ *buff = '\0'; } return 0; } tmp...
12,124,114,212,897,463,000,000,000,000,000,000,000
libopenmpt_modplug.c
274,418,101,621,125,500,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-17113
In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-17113
194,932
openmpt
927688ddab43c2b203569de79407a899e734fabe
https://github.com/OpenMPT/openmpt
https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe
[Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff...
0
LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff) { const char* str; char buf[32]; if(!file) return 0; str = openmpt_module_get_instrument_name(file->mod,qual-1); memset(buf,0,32); if(str){ strncpy(buf,str,31); openmpt_free_string(str); } if(...
337,944,683,734,698,800,000,000,000,000,000,000,000
libopenmpt_modplug.c
263,530,517,036,676,950,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-17113
In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-17113
10,629
openmpt
927688ddab43c2b203569de79407a899e734fabe
https://github.com/OpenMPT/openmpt
https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe
[Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff...
1
LIBOPENMPT_MODPLUG_API unsigned int ModPlug_SampleName(ModPlugFile* file, unsigned int qual, char* buff) { const char* str; unsigned int retval; size_t tmpretval; if(!file) return 0; str = openmpt_module_get_sample_name(file->mod,qual-1); if(!str){ if(buff){ *buff = '\0'; } return 0; } tmpretval =...
294,694,415,044,715,340,000,000,000,000,000,000,000
libopenmpt_modplug.c
274,418,101,621,125,500,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-17113
In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-17113
194,933
openmpt
927688ddab43c2b203569de79407a899e734fabe
https://github.com/OpenMPT/openmpt
https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe
[Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff...
0
LIBOPENMPT_MODPLUG_API unsigned int ModPlug_SampleName(ModPlugFile* file, unsigned int qual, char* buff) { const char* str; char buf[32]; if(!file) return 0; str = openmpt_module_get_sample_name(file->mod,qual-1); memset(buf,0,32); if(str){ strncpy(buf,str,31); openmpt_free_string(str); } if(buff){ ...
318,037,397,692,104,100,000,000,000,000,000,000,000
libopenmpt_modplug.c
263,530,517,036,676,950,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-17113
In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-17113
10,636
pam-u2f
7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3
https://github.com/Yubico/pam-u2f
https://github.com/Yubico/pam-u2f/commit/7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3
Drop privileges by default when opening user-related files The module is typically executed as root and would sometimes open files or follow symlinks that could be controlled from the outside. Drop privileges to the target user before opening any files. Fixes CVE-2019-12209. Thanks to Matthias Gerstner of the SUSE ...
1
int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) { struct passwd *pw = NULL, pw_s; const char *user = NULL; cfg_t cfg_st; cfg_t *cfg = &cfg_st; char buffer[BUFSIZE]; char *buf = NULL; char *authfile_dir; size_t authfile_dir_len; int pgu_ret,...
247,266,602,847,718,400,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2019-12209
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part o...
https://nvd.nist.gov/vuln/detail/CVE-2019-12209
194,938
pam-u2f
7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3
https://github.com/Yubico/pam-u2f
https://github.com/Yubico/pam-u2f/commit/7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3
Drop privileges by default when opening user-related files The module is typically executed as root and would sometimes open files or follow symlinks that could be controlled from the outside. Drop privileges to the target user before opening any files. Fixes CVE-2019-12209. Thanks to Matthias Gerstner of the SUSE ...
0
int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) { struct passwd *pw = NULL, pw_s; const char *user = NULL; cfg_t cfg_st; cfg_t *cfg = &cfg_st; char buffer[BUFSIZE]; char *buf = NULL; char *authfile_dir; size_t authfile_dir_len; int pgu_ret,...
70,870,740,254,689,090,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2019-12209
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part o...
https://nvd.nist.gov/vuln/detail/CVE-2019-12209
10,640
ext-http
17137d4ab1ce81a2cee0fae842340a344ef3da83
https://github.com/m6w6/ext-http
https://github.com/m6w6/ext-http/commit/17137d4ab1ce81a2cee0fae842340a344ef3da83
fix bug #73055
1
static void merge_param(HashTable *params, zval *zdata, zval ***current_param, zval ***current_args TSRMLS_DC) { zval **ptr, **zdata_ptr; php_http_array_hashkey_t hkey = php_http_array_hashkey_init(0); #if 0 { zval tmp; INIT_PZVAL_ARRAY(&tmp, params); fprintf(stderr, "params = "); zend_print_zval_r(&tmp, 1 ...
164,440,707,986,027,160,000,000,000,000,000,000,000
php_http_params.c
161,963,913,583,805,180,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2016-7398
A type confusion vulnerability in the merge_param() function of php_http_params.c in PHP's pecl-http extension 3.1.0beta2 (PHP 7) and earlier as well as 2.6.0beta2 (PHP 5) and earlier allows attackers to crash PHP and possibly execute arbitrary code via crafted HTTP requests.
https://nvd.nist.gov/vuln/detail/CVE-2016-7398
194,944
ext-http
17137d4ab1ce81a2cee0fae842340a344ef3da83
https://github.com/m6w6/ext-http
https://github.com/m6w6/ext-http/commit/17137d4ab1ce81a2cee0fae842340a344ef3da83
fix bug #73055
0
static void merge_param(HashTable *params, zval *zdata, zval ***current_param, zval ***current_args TSRMLS_DC) { zval **ptr, **zdata_ptr; php_http_array_hashkey_t hkey = php_http_array_hashkey_init(0); #if 0 { zval tmp; INIT_PZVAL_ARRAY(&tmp, params); fprintf(stderr, "params = "); zend_print_zval_r(&tmp, 1 ...
268,654,700,151,419,160,000,000,000,000,000,000,000
php_http_params.c
147,387,979,765,345,000,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2016-7398
A type confusion vulnerability in the merge_param() function of php_http_params.c in PHP's pecl-http extension 3.1.0beta2 (PHP 7) and earlier as well as 2.6.0beta2 (PHP 5) and earlier allows attackers to crash PHP and possibly execute arbitrary code via crafted HTTP requests.
https://nvd.nist.gov/vuln/detail/CVE-2016-7398
10,642
bdwgc
be9df82919960214ee4b9d3313523bff44fd99e1
https://github.com/ivmai/bdwgc
https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1
Fix allocation size overflows due to rounding. * malloc.c (GC_generic_malloc): Check if the allocation size is rounded to a smaller value. * mallocx.c (GC_generic_malloc_ignore_off_page): Likewise.
1
GC_INNER void * GC_generic_malloc_ignore_off_page(size_t lb, int k) { void *result; size_t lg; size_t lb_rounded; word n_blocks; GC_bool init; DCL_LOCK_STATE; if (SMALL_OBJ(lb)) return(GC_generic_malloc((word)lb, k)); lg = ROUNDED_UP_GRANULES(lb); lb_rounded = GRANULES_TO...
174,440,046,177,171,580,000,000,000,000,000,000,000
mallocx.c
4,482,882,771,485,867,500,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2673
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l...
https://nvd.nist.gov/vuln/detail/CVE-2012-2673
194,945
bdwgc
be9df82919960214ee4b9d3313523bff44fd99e1
https://github.com/ivmai/bdwgc
https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1
Fix allocation size overflows due to rounding. * malloc.c (GC_generic_malloc): Check if the allocation size is rounded to a smaller value. * mallocx.c (GC_generic_malloc_ignore_off_page): Likewise.
0
GC_INNER void * GC_generic_malloc_ignore_off_page(size_t lb, int k) { void *result; size_t lg; size_t lb_rounded; word n_blocks; GC_bool init; DCL_LOCK_STATE; if (SMALL_OBJ(lb)) return(GC_generic_malloc((word)lb, k)); lg = ROUNDED_UP_GRANULES(lb); lb_rounded = GRANULES_TO...
220,297,858,673,001,670,000,000,000,000,000,000,000
mallocx.c
123,389,046,630,789,940,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2673
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l...
https://nvd.nist.gov/vuln/detail/CVE-2012-2673
10,644
bdwgc
83231d0ab5ed60015797c3d1ad9056295ac3b2bb
https://github.com/ivmai/bdwgc
https://github.com/ivmai/bdwgc/commit/83231d0ab5ed60015797c3d1ad9056295ac3b2bb
Speedup calloc size overflow check by preventing division if small values * malloc.c (GC_SQRT_SIZE_MAX): New macro. * malloc.c (calloc): Add fast initial size overflow check to avoid integer division for reasonably small values passed.
1
void * calloc(size_t n, size_t lb) { if (lb && n > GC_SIZE_MAX / lb) return NULL; # if defined(GC_LINUX_THREADS) /* && !defined(USE_PROC_FOR_LIBRARIES) */ /* libpthread allocated some memory that is only pointed to by */ /* mmapped thread stacks. Make sure it's not collectable. *...
286,136,948,008,637,870,000,000,000,000,000,000,000
malloc.c
209,968,943,630,946,800,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2673
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l...
https://nvd.nist.gov/vuln/detail/CVE-2012-2673
194,946
bdwgc
83231d0ab5ed60015797c3d1ad9056295ac3b2bb
https://github.com/ivmai/bdwgc
https://github.com/ivmai/bdwgc/commit/83231d0ab5ed60015797c3d1ad9056295ac3b2bb
Speedup calloc size overflow check by preventing division if small values * malloc.c (GC_SQRT_SIZE_MAX): New macro. * malloc.c (calloc): Add fast initial size overflow check to avoid integer division for reasonably small values passed.
0
void * calloc(size_t n, size_t lb) { if ((lb | n) > GC_SQRT_SIZE_MAX /* fast initial test */ && lb && n > GC_SIZE_MAX / lb) return NULL; # if defined(GC_LINUX_THREADS) /* && !defined(USE_PROC_FOR_LIBRARIES) */ /* libpthread allocated some memory that is only pointed to by */ /*...
178,088,042,193,459,000,000,000,000,000,000,000,000
malloc.c
330,806,026,827,025,870,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2673
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l...
https://nvd.nist.gov/vuln/detail/CVE-2012-2673
10,651
OpenJK
f61fe5f6a0419ef4a88d46a128052f2e8352e85d
https://github.com/JACoders/OpenJK
https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d
None
1
qboolean S_AL_Init( soundInterface_t *si ) { #ifdef USE_OPENAL const char* device = NULL; const char* inputdevice = NULL; int i; if( !si ) { return qfalse; } for (i = 0; i < MAX_RAW_STREAMS; i++) { streamSourceHandles[i] = -1; streamPlaying[i] = qfalse; streamSources[i] = 0; streamNumBuffers[i] = 0; ...
150,263,890,990,416,820,000,000,000,000,000,000,000
None
null
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
194,949
OpenJK
f61fe5f6a0419ef4a88d46a128052f2e8352e85d
https://github.com/JACoders/OpenJK
https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d
None
0
qboolean S_AL_Init( soundInterface_t *si ) { #ifdef USE_OPENAL const char* device = NULL; const char* inputdevice = NULL; int i; if( !si ) { return qfalse; } for (i = 0; i < MAX_RAW_STREAMS; i++) { streamSourceHandles[i] = -1; streamPlaying[i] = qfalse; streamSources[i] = 0; streamNumBuffers[i] = 0; ...
8,417,204,272,080,032,000,000,000,000,000,000,000
None
null
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
10,663
redis
1eb08bcd4634ae42ec45e8284923ac048beaa4c3
https://github.com/antirez/redis
https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3
Security: update Lua struct package for security. During an auditing Apple found that the "struct" Lua package we ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains a security problem. A bound-checking statement fails because of integer overflow. The bug exists since we initially integrated this pac...
1
static int getnum (lua_State *L, const char **fmt, int df) { if (!isdigit(**fmt)) /* no number? */ return df; /* return default value */ else { int a = 0; do { if (a > (INT_MAX / 10) || a * 10 > (INT_MAX - (**fmt - '0'))) luaL_error(L, "integral size overflow"); a = a*10 + *(...
107,382,855,017,923,050,000,000,000,000,000,000,000
lua_struct.c
314,192,746,630,728,530,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-14147
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which trigger...
https://nvd.nist.gov/vuln/detail/CVE-2020-14147
194,960
redis
1eb08bcd4634ae42ec45e8284923ac048beaa4c3
https://github.com/antirez/redis
https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3
Security: update Lua struct package for security. During an auditing Apple found that the "struct" Lua package we ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains a security problem. A bound-checking statement fails because of integer overflow. The bug exists since we initially integrated this pac...
0
static int getnum (lua_State *L, const char **fmt, int df) { static int getnum (const char **fmt, int df) { if (!isdigit(**fmt)) /* no number? */ return df; /* return default value */ else { int a = 0; do { a = a*10 + *((*fmt)++) - '0'; } while (isdigit(**fmt)); return a; } }
36,211,685,942,156,430,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2020-14147
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which trigger...
https://nvd.nist.gov/vuln/detail/CVE-2020-14147
10,668
FFmpeg
afc9c683ed9db01edb357bc8c19edad4282b3a97
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/afc9c683ed9db01edb357bc8c19edad4282b3a97
avformat/asfdec: Fix DoS in asf_build_simple_index() Fixes: Missing EOF check in loop No testcase Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int asf_build_simple_index(AVFormatContext *s, int stream_index) { ff_asf_guid g; ASFContext *asf = s->priv_data; int64_t current_pos = avio_tell(s->pb); int64_t ret; if((ret = avio_seek(s->pb, asf->data_object_offset + asf->data_object_size, SEEK_SET)) < 0) { return ret; } ...
185,787,158,206,728,830,000,000,000,000,000,000,000
asfdec_f.c
98,577,571,352,562,340,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2017-14223
In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU ...
https://nvd.nist.gov/vuln/detail/CVE-2017-14223
159,933
FFmpeg
afc9c683ed9db01edb357bc8c19edad4282b3a97
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/afc9c683ed9db01edb357bc8c19edad4282b3a97
avformat/asfdec: Fix DoS in asf_build_simple_index() Fixes: Missing EOF check in loop No testcase Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int asf_build_simple_index(AVFormatContext *s, int stream_index) { ff_asf_guid g; ASFContext *asf = s->priv_data; int64_t current_pos = avio_tell(s->pb); int64_t ret; if((ret = avio_seek(s->pb, asf->data_object_offset + asf->data_object_size, SEEK_SET)) < 0) { return ret; } ...
175,804,409,508,149,660,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2017-14223
In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU ...
https://nvd.nist.gov/vuln/detail/CVE-2017-14223
10,669
WavPack
6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
issue #33, sanitize size of unknown chunks before malloc()
1
int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0; int64_t total_samples = 0, infilesize; RiffChunkHeader riff_chunk_header; ChunkHeader chunk_header; WaveHeader WaveHeader; ...
51,282,300,993,233,380,000,000,000,000,000,000,000
riff.c
243,900,457,214,797,240,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-10539
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub...
https://nvd.nist.gov/vuln/detail/CVE-2018-10539
160,981
WavPack
6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
issue #33, sanitize size of unknown chunks before malloc()
0
int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0; int64_t total_samples = 0, infilesize; RiffChunkHeader riff_chunk_header; ChunkHeader chunk_header; WaveHeader WaveHeader; ...
196,976,688,496,361,640,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-10539
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub...
https://nvd.nist.gov/vuln/detail/CVE-2018-10539
10,670
WavPack
6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
issue #33, sanitize size of unknown chunks before malloc()
1
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
140,429,834,578,859,400,000,000,000,000,000,000,000
dsdiff.c
256,009,659,393,804,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-10539
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub...
https://nvd.nist.gov/vuln/detail/CVE-2018-10539
160,980
WavPack
6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
issue #33, sanitize size of unknown chunks before malloc()
0
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
78,576,659,825,872,350,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-10539
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub...
https://nvd.nist.gov/vuln/detail/CVE-2018-10539
10,671
WavPack
6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
issue #33, sanitize size of unknown chunks before malloc()
1
int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t total_samples = 0, infilesize; Wave64ChunkHeader chunk_header; Wave64FileHeader filehdr; WaveHeader WaveHeader; uint32_t bcount; infilesize = DoGetFileSize (infile); ...
210,565,535,641,398,630,000,000,000,000,000,000,000
wave64.c
79,248,399,197,577,640,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-10539
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub...
https://nvd.nist.gov/vuln/detail/CVE-2018-10539
160,982
WavPack
6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
issue #33, sanitize size of unknown chunks before malloc()
0
int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t total_samples = 0, infilesize; Wave64ChunkHeader chunk_header; Wave64FileHeader filehdr; WaveHeader WaveHeader; uint32_t bcount; infilesize = DoGetFileSize (infile); ...
267,491,405,540,274,750,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-10539
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub...
https://nvd.nist.gov/vuln/detail/CVE-2018-10539
10,672
file
d7cdad007c507e6c79f51f058dd77fab70ceb9f6
https://github.com/file/file
https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6
Stop reporting bad capabilities after the first few.
1
doshn(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num, size_t size, off_t fsize, int *flags, int mach, int strtab) { Elf32_Shdr sh32; Elf64_Shdr sh64; int stripped = 1; void *nbuf; off_t noff, coff, name_off; uint64_t cap_hw1 = 0; /* SunOS 5.x hardware capabilites */ uint64_t cap_sf1 = ...
221,056,719,166,951,300,000,000,000,000,000,000,000
readelf.c
112,084,290,937,460,670,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2014-8116
The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
https://nvd.nist.gov/vuln/detail/CVE-2014-8116
158,964
file
d7cdad007c507e6c79f51f058dd77fab70ceb9f6
https://github.com/file/file
https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6
Stop reporting bad capabilities after the first few.
0
doshn(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num, size_t size, off_t fsize, int *flags, int mach, int strtab) { Elf32_Shdr sh32; Elf64_Shdr sh64; int stripped = 1; size_t nbadcap = 0; void *nbuf; off_t noff, coff, name_off; uint64_t cap_hw1 = 0; /* SunOS 5.x hardware capabili...
312,090,184,179,485,900,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-8116
The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
https://nvd.nist.gov/vuln/detail/CVE-2014-8116
10,673
linux
820f9f147dcce2602eefd9b575bbbd9ea14f0953
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953
fs_pin: Allow for the possibility that m_list or s_list go unused. This is needed to support lazily umounting locked mounts. Because the entire unmounted subtree needs to stay together until there are no users with references to any part of the subtree. To support this guarantee that the fs_pin m_list and s_list nod...
1
void pin_remove(struct fs_pin *pin) { spin_lock(&pin_lock); hlist_del(&pin->m_list); hlist_del(&pin->s_list); spin_unlock(&pin_lock); spin_lock_irq(&pin->wait.lock); pin->done = 1; wake_up_locked(&pin->wait); spin_unlock_irq(&pin->wait.lock); }
276,769,003,975,703,430,000,000,000,000,000,000,000
fs_pin.c
42,002,380,277,084,830,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-4178
The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/li...
https://nvd.nist.gov/vuln/detail/CVE-2015-4178
184,500
linux
820f9f147dcce2602eefd9b575bbbd9ea14f0953
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953
fs_pin: Allow for the possibility that m_list or s_list go unused. This is needed to support lazily umounting locked mounts. Because the entire unmounted subtree needs to stay together until there are no users with references to any part of the subtree. To support this guarantee that the fs_pin m_list and s_list nod...
0
void pin_remove(struct fs_pin *pin) { spin_lock(&pin_lock); hlist_del_init(&pin->m_list); hlist_del_init(&pin->s_list); spin_unlock(&pin_lock); spin_lock_irq(&pin->wait.lock); pin->done = 1; wake_up_locked(&pin->wait); spin_unlock_irq(&pin->wait.lock); }
137,235,191,729,207,960,000,000,000,000,000,000,000
fs_pin.c
159,304,535,075,323,350,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-4178
The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/li...
https://nvd.nist.gov/vuln/detail/CVE-2015-4178
10,675
qemu
5193be3be35f29a35bc465036cd64ad60d43385f
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=5193be3be35f29a35bc465036cd64ad60d43385f
tsc210x: fix buffer overrun on invalid state load CVE-2013-4539 s->precision, nextprecision, function and nextfunction come from wire and are used as idx into resolution[] in TSC_CUT_RESOLUTION. Validate after load to avoid buffer overrun. Cc: Andreas Färber <afaerber@suse.de> Signed-off-by: Michael S. Tsirkin <mst...
1
static int tsc210x_load(QEMUFile *f, void *opaque, int version_id) { TSC210xState *s = (TSC210xState *) opaque; int64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); int i; s->x = qemu_get_be16(f); s->y = qemu_get_be16(f); s->pressure = qemu_get_byte(f); s->state = qemu_get_byte(f); s->...
138,472,856,828,999,150,000,000,000,000,000,000,000
tsc210x.c
279,793,609,608,789,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4539
Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4539
194,776
qemu
5193be3be35f29a35bc465036cd64ad60d43385f
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=5193be3be35f29a35bc465036cd64ad60d43385f
tsc210x: fix buffer overrun on invalid state load CVE-2013-4539 s->precision, nextprecision, function and nextfunction come from wire and are used as idx into resolution[] in TSC_CUT_RESOLUTION. Validate after load to avoid buffer overrun. Cc: Andreas Färber <afaerber@suse.de> Signed-off-by: Michael S. Tsirkin <mst...
0
static int tsc210x_load(QEMUFile *f, void *opaque, int version_id) { TSC210xState *s = (TSC210xState *) opaque; int64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); int i; s->x = qemu_get_be16(f); s->y = qemu_get_be16(f); s->pressure = qemu_get_byte(f); s->state = qemu_get_byte(f); s->...
141,640,601,484,357,580,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4539
Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4539
10,676
FFmpeg
7d57ca4d9a75562fa32e40766211de150f8b3ee7
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7
avformat/rtmppkt: Check for packet size mismatches Fixes out of array access Found-by: Paul Cher <paulcher@icloud.com> Reviewed-by: Paul Cher <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int rtmp_packet_read_one_chunk(URLContext *h, RTMPPacket *p, int chunk_size, RTMPPacket **prev_pkt_ptr, int *nb_prev_pkt, uint8_t hdr) { uint8_t buf[16]; int channel_id, timestamp, size; uint32_t ts_field; // non-extended ti...
40,257,325,432,950,084,000,000,000,000,000,000,000
rtmppkt.c
141,124,247,872,373,150,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10191
Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.
https://nvd.nist.gov/vuln/detail/CVE-2016-10191
160,440
FFmpeg
7d57ca4d9a75562fa32e40766211de150f8b3ee7
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7
avformat/rtmppkt: Check for packet size mismatches Fixes out of array access Found-by: Paul Cher <paulcher@icloud.com> Reviewed-by: Paul Cher <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int rtmp_packet_read_one_chunk(URLContext *h, RTMPPacket *p, int chunk_size, RTMPPacket **prev_pkt_ptr, int *nb_prev_pkt, uint8_t hdr) { uint8_t buf[16]; int channel_id, timestamp, size; uint32_t ts_field; // non-extended ti...
328,800,641,748,049,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10191
Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.
https://nvd.nist.gov/vuln/detail/CVE-2016-10191
10,677
Espruino
a0d7f432abee692402c00e8b615ff5982dde9780
https://github.com/espruino/Espruino
https://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780
Fix stack size detection on Linux (fix #1427)
1
size_t jsuGetFreeStack() { #ifdef ARM void *frame = __builtin_frame_address(0); size_t stackPos = (size_t)((char*)frame); size_t stackEnd = (size_t)((char*)&LINKER_END_VAR); if (stackPos < stackEnd) return 0; // should never happen, but just in case of overflow! return stackPos - stackEnd; #elif defined(LINU...
330,734,069,179,736,960,000,000,000,000,000,000,000
jsutils.c
167,719,314,479,966,560,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-11590
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via an integer overflow during syntax parsing. This was addressed by fixing stack size detection on Linux in jsutils.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11590
160,963
Espruino
a0d7f432abee692402c00e8b615ff5982dde9780
https://github.com/espruino/Espruino
https://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780
Fix stack size detection on Linux (fix #1427)
0
size_t jsuGetFreeStack() { #ifdef ARM void *frame = __builtin_frame_address(0); size_t stackPos = (size_t)((char*)frame); size_t stackEnd = (size_t)((char*)&LINKER_END_VAR); if (stackPos < stackEnd) return 0; // should never happen, but just in case of overflow! return stackPos - stackEnd; #elif defined(LINU...
43,489,234,908,362,470,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2018-11590
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via an integer overflow during syntax parsing. This was addressed by fixing stack size detection on Linux in jsutils.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11590
10,678
suricata
11f3659f64a4e42e90cb3c09fcef66894205aefe
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe
teredo: be stricter on what to consider valid teredo Invalid Teredo can lead to valid DNS traffic (or other UDP traffic) being misdetected as Teredo. This leads to false negatives in the UDP payload inspection. Make the teredo code only consider a packet teredo if the encapsulated data was decoded without any 'invali...
1
int DecodeTeredo(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq) { if (!g_teredo_enabled) return TM_ECODE_FAILED; uint8_t *start = pkt; /* Is this packet to short to contain an IPv6 packet ? */ if (len < IPV6_HEADER_LEN) return TM_ECODE_FA...
14,393,695,795,783,696,000,000,000,000,000,000,000
decode-teredo.c
159,294,858,855,935,220,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010251
161,139
suricata
11f3659f64a4e42e90cb3c09fcef66894205aefe
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe
teredo: be stricter on what to consider valid teredo Invalid Teredo can lead to valid DNS traffic (or other UDP traffic) being misdetected as Teredo. This leads to false negatives in the UDP payload inspection. Make the teredo code only consider a packet teredo if the encapsulated data was decoded without any 'invali...
0
int DecodeTeredo(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq) { if (!g_teredo_enabled) return TM_ECODE_FAILED; uint8_t *start = pkt; /* Is this packet to short to contain an IPv6 packet ? */ if (len < IPV6_HEADER_LEN) return TM_ECODE_FA...
123,321,690,728,916,260,000,000,000,000,000,000,000
decode-teredo.c
220,157,870,556,823,400,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010251
10,679
suricata
11f3659f64a4e42e90cb3c09fcef66894205aefe
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe
teredo: be stricter on what to consider valid teredo Invalid Teredo can lead to valid DNS traffic (or other UDP traffic) being misdetected as Teredo. This leads to false negatives in the UDP payload inspection. Make the teredo code only consider a packet teredo if the encapsulated data was decoded without any 'invali...
1
DecodeIPV6ExtHdrs(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq) { SCEnter(); uint8_t *orig_pkt = pkt; uint8_t nh = 0; /* careful, 0 is actually a real type */ uint16_t hdrextlen = 0; uint16_t plen; char dstopts = 0; char exthdr_fh_done = 0; ...
156,698,936,785,910,100,000,000,000,000,000,000,000
decode-ipv6.c
100,517,174,549,297,110,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010251
161,138
suricata
11f3659f64a4e42e90cb3c09fcef66894205aefe
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe
teredo: be stricter on what to consider valid teredo Invalid Teredo can lead to valid DNS traffic (or other UDP traffic) being misdetected as Teredo. This leads to false negatives in the UDP payload inspection. Make the teredo code only consider a packet teredo if the encapsulated data was decoded without any 'invali...
0
DecodeIPV6ExtHdrs(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq) { SCEnter(); uint8_t *orig_pkt = pkt; uint8_t nh = IPV6_GET_NH(p); /* careful, 0 is actually a real type */ uint16_t hdrextlen = 0; uint16_t plen = len; char dstopts = 0; c...
58,104,851,008,513,920,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010251
10,682
qemu
afbcc40bee4ef51731102d7d4b499ee12fc182e1
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=afbcc40bee4ef51731102d7d4b499ee12fc182e1
parallels: Fix catalog size integer overflow (CVE-2014-0143) The first test case would cause a huge memory allocation, leading to a qemu abort; the second one to a too small malloc() for the catalog (smaller than s->catalog_size), which causes a read-only out-of-bounds array access and on big endian hosts an endianess...
1
static int parallels_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVParallelsState *s = bs->opaque; int i; struct parallels_header ph; int ret; bs->read_only = 1; // no write support yet ret = bdrv_pread(bs->file, 0, &ph, sizeof(ph)); if...
208,362,155,379,597,650,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2014-0143
Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn...
https://nvd.nist.gov/vuln/detail/CVE-2014-0143
194,797
qemu
afbcc40bee4ef51731102d7d4b499ee12fc182e1
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=afbcc40bee4ef51731102d7d4b499ee12fc182e1
parallels: Fix catalog size integer overflow (CVE-2014-0143) The first test case would cause a huge memory allocation, leading to a qemu abort; the second one to a too small malloc() for the catalog (smaller than s->catalog_size), which causes a read-only out-of-bounds array access and on big endian hosts an endianess...
0
static int parallels_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVParallelsState *s = bs->opaque; int i; struct parallels_header ph; int ret; bs->read_only = 1; // no write support yet ret = bdrv_pread(bs->file, 0, &ph, sizeof(ph)); if...
281,901,401,885,024,440,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2014-0143
Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn...
https://nvd.nist.gov/vuln/detail/CVE-2014-0143
10,685
FFmpeg
bd27a9364ca274ca97f1df6d984e88a0700fb235
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/bd27a9364ca274ca97f1df6d984e88a0700fb235
avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile The profile field is changed by code inside and outside the decoder, its not a reliable indicator of the internal codec state. Maintaining it consistency with studio_profile is messy. Its easier to just avoid it and use ...
1
static int er_supported(ERContext *s) { if(s->avctx->hwaccel && s->avctx->hwaccel->decode_slice || !s->cur_pic.f || s->cur_pic.field_picture || s->avctx->profile == FF_PROFILE_MPEG4_SIMPLE_STUDIO ...
141,920,714,405,357,940,000,000,000,000,000,000,000
error_resilience.c
110,359,710,284,682,150,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-13304
In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-13304
160,913
FFmpeg
bd27a9364ca274ca97f1df6d984e88a0700fb235
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/bd27a9364ca274ca97f1df6d984e88a0700fb235
avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile The profile field is changed by code inside and outside the decoder, its not a reliable indicator of the internal codec state. Maintaining it consistency with studio_profile is messy. Its easier to just avoid it and use ...
0
static int er_supported(ERContext *s) { if(s->avctx->hwaccel && s->avctx->hwaccel->decode_slice || !s->cur_pic.f || s->cur_pic.field_picture ) return 0; return 1; }
164,432,667,261,191,540,000,000,000,000,000,000,000
error_resilience.c
150,366,930,510,644,580,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-13304
In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-13304
10,687
file
27a14bc7ba285a0a5ebfdb55e54001aa11932b08
https://github.com/file/file
https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08
Correctly compute the truncated pascal string size (Francisco Alonso and Jan Kaluza at RedHat)
1
*/ private int mconvert(struct magic_set *ms, struct magic *m, int flip) { union VALUETYPE *p = &ms->ms_value; uint8_t type; switch (type = cvt_flip(m->type, flip)) { case FILE_BYTE: cvt_8(p, m); return 1; case FILE_SHORT: cvt_16(p, m); return 1; case FILE_LONG: case FILE_DATE: case FILE_LDATE: cvt_...
118,264,346,288,892,310,000,000,000,000,000,000,000
softmagic.c
243,897,300,208,014,660,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-3478
Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
https://nvd.nist.gov/vuln/detail/CVE-2014-3478
159,023
file
27a14bc7ba285a0a5ebfdb55e54001aa11932b08
https://github.com/file/file
https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08
Correctly compute the truncated pascal string size (Francisco Alonso and Jan Kaluza at RedHat)
0
mconvert(struct magic_set *ms, struct magic *m, int flip) { union VALUETYPE *p = &ms->ms_value; uint8_t type; switch (type = cvt_flip(m->type, flip)) { case FILE_BYTE: cvt_8(p, m); return 1; case FILE_SHORT: cvt_16(p, m); return 1; case FILE_LONG: case FILE_DATE: case FILE_LDATE: cvt_32(p, m); retu...
254,524,848,727,113,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3478
Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
https://nvd.nist.gov/vuln/detail/CVE-2014-3478
10,692
systemd
505b6a61c22d5565e9308045c7b9bf79f7d0517e
https://github.com/systemd/systemd
https://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e
journald: don't accept arbitrarily sized journal data fields https://bugzilla.redhat.com/show_bug.cgi?id=858746
1
void server_process_native_message( Server *s, const void *buffer, size_t buffer_size, struct ucred *ucred, struct timeval *tv, const char *label, size_t label_len) { struct iovec *iovec = NULL; unsigned n = 0, m = 0, j, tn...
206,165,572,902,001,330,000,000,000,000,000,000,000
journald-native.c
120,038,332,300,868,240,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4391
Integer overflow in the valid_user_field function in journal/journald-native.c in systemd allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large journal data field, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2013-4391
157,925
systemd
505b6a61c22d5565e9308045c7b9bf79f7d0517e
https://github.com/systemd/systemd
https://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e
journald: don't accept arbitrarily sized journal data fields https://bugzilla.redhat.com/show_bug.cgi?id=858746
0
void server_process_native_message( Server *s, const void *buffer, size_t buffer_size, struct ucred *ucred, struct timeval *tv, const char *label, size_t label_len) { struct iovec *iovec = NULL; unsigned n = 0, m = 0, j, tn...
176,204,361,052,328,700,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2013-4391
Integer overflow in the valid_user_field function in journal/journald-native.c in systemd allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large journal data field, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2013-4391
10,693
WavPack
8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
issue #28, fix buffer overflows and bad allocs on corrupt CAF files
1
int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { uint32_t chan_chunk = 0, channel_layout = 0, bcount; unsigned char *channel_identities = NULL; unsigned char *channel_reorder = NULL; int64_t total_samples = 0, infilesize; CAFFileH...
248,948,390,429,775,130,000,000,000,000,000,000,000
caff.c
180,637,342,133,898,580,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-7254
The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-7254
161,031
WavPack
8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
issue #28, fix buffer overflows and bad allocs on corrupt CAF files
0
int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { uint32_t chan_chunk = 0, channel_layout = 0, bcount; unsigned char *channel_identities = NULL; unsigned char *channel_reorder = NULL; int64_t total_samples = 0, infilesize; CAFFileH...
244,494,973,090,719,350,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-7254
The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-7254
10,708
qemu
b16c129daf0fed91febbb88de23dae8271c8898a
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=b16c129daf0fed91febbb88de23dae8271c8898a
usb: ehci: fix memory leak in ehci_process_itd While processing isochronous transfer descriptors(iTD), if the page select(PG) field value is out of bands it will return. In this situation the ehci's sg list is not freed thus leading to a memory leak issue. This patch avoid this. Signed-off-by: Li Qiang <liqiang6-s@36...
1
static int ehci_process_itd(EHCIState *ehci, EHCIitd *itd, uint32_t addr) { USBDevice *dev; USBEndpoint *ep; uint32_t i, len, pid, dir, devaddr, endp; uint32_t pg, off, ptr1, ptr2, max, mult; ehci->periodic_sched_active = PERIODIC_ACTIVE; ...
33,948,406,223,871,267,000,000,000,000,000,000,000
hcd-ehci.c
236,559,692,809,978,640,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-7995
Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
https://nvd.nist.gov/vuln/detail/CVE-2016-7995
194,657
qemu
b16c129daf0fed91febbb88de23dae8271c8898a
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=b16c129daf0fed91febbb88de23dae8271c8898a
usb: ehci: fix memory leak in ehci_process_itd While processing isochronous transfer descriptors(iTD), if the page select(PG) field value is out of bands it will return. In this situation the ehci's sg list is not freed thus leading to a memory leak issue. This patch avoid this. Signed-off-by: Li Qiang <liqiang6-s@36...
0
static int ehci_process_itd(EHCIState *ehci, EHCIitd *itd, uint32_t addr) { USBDevice *dev; USBEndpoint *ep; uint32_t i, len, pid, dir, devaddr, endp; uint32_t pg, off, ptr1, ptr2, max, mult; ehci->periodic_sched_active = PERIODIC_ACTIVE; ...
249,435,086,637,306,350,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-7995
Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
https://nvd.nist.gov/vuln/detail/CVE-2016-7995
10,709
radare2
ead645853a63bf83d8386702cad0cf23b31d7eeb
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/ead645853a63bf83d8386702cad0cf23b31d7eeb
fix #6857
1
static int dex_loadcode(RBinFile *arch, RBinDexObj *bin) { struct r_bin_t *rbin = arch->rbin; int i; int *methods = NULL; int sym_count = 0; // doublecheck?? if (!bin || bin->methods_list) { return false; } bin->code_from = UT64_MAX; bin->code_to = 0; bin->methods_list = r_list_newf ((RListFree)free); if ...
59,972,490,419,326,860,000,000,000,000,000,000,000
bin_dex.c
330,647,830,799,263,530,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-6387
The dex_loadcode function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6387
160,333
radare2
ead645853a63bf83d8386702cad0cf23b31d7eeb
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/ead645853a63bf83d8386702cad0cf23b31d7eeb
fix #6857
0
static int dex_loadcode(RBinFile *arch, RBinDexObj *bin) { struct r_bin_t *rbin = arch->rbin; int i; int *methods = NULL; int sym_count = 0; if (!bin || bin->methods_list) { return false; } bin->code_from = UT64_MAX; bin->code_to = 0; bin->methods_list = r_list_newf ((RListFree)free); if (!bin->methods_lis...
75,435,306,666,555,000,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-6387
The dex_loadcode function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6387
10,710
file
447558595a3650db2886cd2f416ad0beba965801
https://github.com/file/file
https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801
PR/313: Aaron Reffett: Check properly for exceeding the offset.
1
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, int recursion_level, int *printed_something, int *need_separator, int *returnval) { uint32_t soffset, offset = ms->offset; uint32_t count = m->st...
271,515,507,458,392,820,000,000,000,000,000,000,000
softmagic.c
154,882,840,241,016,350,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2270
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
https://nvd.nist.gov/vuln/detail/CVE-2014-2270
159,050
file
447558595a3650db2886cd2f416ad0beba965801
https://github.com/file/file
https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801
PR/313: Aaron Reffett: Check properly for exceeding the offset.
0
mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, int recursion_level, int *printed_something, int *need_separator, int *returnval) { uint32_t soffset, offset = ms->offset; uint32_t count = m->str_range; int...
82,959,091,173,486,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-2270
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
https://nvd.nist.gov/vuln/detail/CVE-2014-2270
10,711
libpcap
33834cb2a4d035b52aa2a26742f832a112e90a0a
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a
In the open request, reject capture sources that are URLs. You shouldn't be able to ask a server to open a remote device on some *other* server; just open it yourself. This addresses Include Security issue F13: [libpcap] Remote Packet Capture Daemon Allows Opening Capture URLs.
1
daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, char *source, size_t sourcelen) { char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client pcap_t *fp; // pcap_t main variable int nread; char sendbuf[RPCA...
213,239,153,397,732,850,000,000,000,000,000,000,000
daemon.c
30,742,645,121,715,390,000,000,000,000,000,000,000
[ "CWE-918" ]
CVE-2019-15164
rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source.
https://nvd.nist.gov/vuln/detail/CVE-2019-15164
161,188
libpcap
33834cb2a4d035b52aa2a26742f832a112e90a0a
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a
In the open request, reject capture sources that are URLs. You shouldn't be able to ask a server to open a remote device on some *other* server; just open it yourself. This addresses Include Security issue F13: [libpcap] Remote Packet Capture Daemon Allows Opening Capture URLs.
0
daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, char *source, size_t sourcelen) { char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client pcap_t *fp; // pcap_t main variable int nread; char sendbuf[RPCA...
85,154,801,581,540,180,000,000,000,000,000,000,000
None
null
[ "CWE-918" ]
CVE-2019-15164
rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source.
https://nvd.nist.gov/vuln/detail/CVE-2019-15164
10,712
libplist
7391a506352c009fe044dead7baad9e22dd279ee
https://github.com/libimobiledevice/libplist
https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee
plistutil: Prevent OOB heap buffer read by checking input size As pointed out in #87 plistutil would do a memcmp with a heap buffer without checking the size. If the size is less than 8 it would read beyond the bounds of this heap buffer. This commit prevents that.
1
int main(int argc, char *argv[]) { FILE *iplist = NULL; plist_t root_node = NULL; char *plist_out = NULL; uint32_t size = 0; int read_size = 0; char *plist_entire = NULL; struct stat filestats; options_t *options = parse_arguments(argc, argv); if (!options) { print_usage...
113,011,307,546,855,480,000,000,000,000,000,000,000
plistutil.c
206,884,772,435,069,850,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-5545
The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2017-5545
160,372
libplist
7391a506352c009fe044dead7baad9e22dd279ee
https://github.com/libimobiledevice/libplist
https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee
plistutil: Prevent OOB heap buffer read by checking input size As pointed out in #87 plistutil would do a memcmp with a heap buffer without checking the size. If the size is less than 8 it would read beyond the bounds of this heap buffer. This commit prevents that.
0
int main(int argc, char *argv[]) { FILE *iplist = NULL; plist_t root_node = NULL; char *plist_out = NULL; uint32_t size = 0; int read_size = 0; char *plist_entire = NULL; struct stat filestats; options_t *options = parse_arguments(argc, argv); if (!options) { print_usage...
293,414,456,488,667,030,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-5545
The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2017-5545
10,713
qemu
3592fe0c919cf27a81d8e9f9b4f269553418bb01
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=3592fe0c919cf27a81d8e9f9b4f269553418bb01
char: serial: check divider value against baud base 16550A UART device uses an oscillator to generate frequencies (baud base), which decide communication speed. This speed could be changed by dividing it by a divider. If the divider is greater than the baud base, speed is set to zero, leading to a divide by zero error...
1
static void serial_update_parameters(SerialState *s) { int speed, parity, data_bits, stop_bits, frame_size; QEMUSerialSetParams ssp; if (s->divider == 0) return; /* Start bit. */ frame_size = 1; if (s->lcr & 0x08) { /* Parity bit. */ frame_size++; if (s->lcr & 0...
35,876,664,800,758,523,000,000,000,000,000,000,000
serial.c
36,261,584,884,359,340,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2016-8669
The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
https://nvd.nist.gov/vuln/detail/CVE-2016-8669
194,655
qemu
3592fe0c919cf27a81d8e9f9b4f269553418bb01
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=3592fe0c919cf27a81d8e9f9b4f269553418bb01
char: serial: check divider value against baud base 16550A UART device uses an oscillator to generate frequencies (baud base), which decide communication speed. This speed could be changed by dividing it by a divider. If the divider is greater than the baud base, speed is set to zero, leading to a divide by zero error...
0
static void serial_update_parameters(SerialState *s) { int speed, parity, data_bits, stop_bits, frame_size; QEMUSerialSetParams ssp; if (s->divider == 0 || s->divider > s->baudbase) { return; } /* Start bit. */ frame_size = 1; /* Parity bit. */ frame_size++; ...
143,602,637,322,287,840,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-8669
The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
https://nvd.nist.gov/vuln/detail/CVE-2016-8669
10,714
haproxy
efbbdf72992cd20458259962346044cafd9331c0
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy.git;a=commit;h=efbbdf72992cd20458259962346044cafd9331c0
BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response() We need to make sure that the record length is not making us read past the end of the data we received. Before this patch we could for example read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly acce...
1
static int dns_validate_dns_response(unsigned char *resp, unsigned char *bufend, struct dns_resolution *resolution, int max_answer_records) { unsigned char *reader; char *previous_dname, tmpname[DNS_MAX_NAME_SIZE]; int len, flags, offset; int dns_query_record_id; int nb_saved_records; struct dns_query_it...
318,380,429,260,227,200,000,000,000,000,000,000,000
dns.c
245,344,784,117,766,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-20102
An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was l...
https://nvd.nist.gov/vuln/detail/CVE-2018-20102
157,882
haproxy
efbbdf72992cd20458259962346044cafd9331c0
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy.git;a=commit;h=efbbdf72992cd20458259962346044cafd9331c0
BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response() We need to make sure that the record length is not making us read past the end of the data we received. Before this patch we could for example read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly acce...
0
static int dns_validate_dns_response(unsigned char *resp, unsigned char *bufend, struct dns_resolution *resolution, int max_answer_records) { unsigned char *reader; char *previous_dname, tmpname[DNS_MAX_NAME_SIZE]; int len, flags, offset; int dns_query_record_id; int nb_saved_records; struct dns_query_it...
269,064,662,063,003,800,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-20102
An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was l...
https://nvd.nist.gov/vuln/detail/CVE-2018-20102
10,715
libpcap
437b273761adedcbd880f714bfa44afeec186a31
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31
Don't crash if crypt() fails. It can fail, so make sure it doesn't before comparing its result with the password. This addresses Include Security issue F12: [libpcap] Remote Packet Capture Daemon Null Pointer Dereference Denial of Service.
1
daemon_AuthUserPwd(char *username, char *password, char *errbuf) { #ifdef _WIN32 /* * Warning: the user which launches the process must have the * SE_TCB_NAME right. * This corresponds to have the "Act as part of the Operating System" * turned on (administrative tools, local security settings, local * polici...
63,029,283,185,700,500,000,000,000,000,000,000,000
daemon.c
265,153,928,199,968,920,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15163
rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
https://nvd.nist.gov/vuln/detail/CVE-2019-15163
161,189
libpcap
437b273761adedcbd880f714bfa44afeec186a31
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31
Don't crash if crypt() fails. It can fail, so make sure it doesn't before comparing its result with the password. This addresses Include Security issue F12: [libpcap] Remote Packet Capture Daemon Null Pointer Dereference Denial of Service.
0
daemon_AuthUserPwd(char *username, char *password, char *errbuf) { #ifdef _WIN32 /* * Warning: the user which launches the process must have the * SE_TCB_NAME right. * This corresponds to have the "Act as part of the Operating System" * turned on (administrative tools, local security settings, local * polici...
304,022,479,763,381,920,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-15163
rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
https://nvd.nist.gov/vuln/detail/CVE-2019-15163
10,716
poppler
da63c35549e8852a410946ab016a3f25ac701bdf
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf
FoFiType1C::convertToType0: Fix crash in broken files Bug #102724
1
void FoFiType1C::convertToType0(char *psName, int *codeMap, int nCodes, FoFiOutputFunc outputFunc, void *outputStream) { int *cidMap; Type1CIndex subrIdx; Type1CIndexVal val; int nCIDs; GooString *buf; Type1CEexecBuf eb; GBool ok; int fd, i, j, k; // compute the CID count and build the CID-to...
147,790,478,051,028,070,000,000,000,000,000,000,000
FoFiType1C.cc
140,291,466,668,214,960,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-14976
The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2017-14976
157,930
poppler
da63c35549e8852a410946ab016a3f25ac701bdf
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf
FoFiType1C::convertToType0: Fix crash in broken files Bug #102724
0
void FoFiType1C::convertToType0(char *psName, int *codeMap, int nCodes, FoFiOutputFunc outputFunc, void *outputStream) { int *cidMap; Type1CIndex subrIdx; Type1CIndexVal val; int nCIDs; GooString *buf; Type1CEexecBuf eb; GBool ok; int fd, i, j, k; if (codeMap) { nCIDs = nCodes; cidMap...
311,317,114,939,992,080,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-14976
The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2017-14976
10,717
WavPack
36a24c7881427d2e1e4dc1cef58f19eee0d13aec
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec
issue #28, do not overwrite heap on corrupt DSDIFF file
1
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
129,741,665,744,977,370,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-7253
The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-7253
161,032
WavPack
36a24c7881427d2e1e4dc1cef58f19eee0d13aec
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec
issue #28, do not overwrite heap on corrupt DSDIFF file
0
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
153,574,137,843,800,550,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-7253
The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-7253
10,718
linux
0449641130f5652b344ef6fa39fa019d7e94660a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660a
ext4: init timer earlier to avoid a kernel panic in __save_error_info During mount, when we fail to open journal inode or root inode, the __save_error_info will mod_timer. But actually s_err_report isn't initialized yet and the kernel oops. The detailed information can be found https://bugzilla.kernel.org/show_bug.cgi...
1
__acquires(kernel_lock) { char *orig_data = kstrdup(data, GFP_KERNEL); struct buffer_head *bh; struct ext4_super_block *es = NULL; struct ext4_sb_info *sbi; ext4_fsblk_t block; ext4_fsblk_t sb_block = get_sb_block(&data); ext4_fsblk_t logical_sb_block; unsigned long offset = 0; unsigned long journal_devnum...
2,883,871,233,556,824,000,000,000,000,000,000,000
super.c
242,967,321,248,923,500,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-2493
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2011-2493
158,686
linux
0449641130f5652b344ef6fa39fa019d7e94660a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660a
ext4: init timer earlier to avoid a kernel panic in __save_error_info During mount, when we fail to open journal inode or root inode, the __save_error_info will mod_timer. But actually s_err_report isn't initialized yet and the kernel oops. The detailed information can be found https://bugzilla.kernel.org/show_bug.cgi...
0
__releases(kernel_lock) __acquires(kernel_lock) { char *orig_data = kstrdup(data, GFP_KERNEL); struct buffer_head *bh; struct ext4_super_block *es = NULL; struct ext4_sb_info *sbi; ext4_fsblk_t block; ext4_fsblk_t sb_block = get_sb_block(&data); ext4_fsblk_t logical_sb_block; unsigned long offset = 0; ...
223,558,280,881,403,080,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2011-2493
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2011-2493
10,719
qemu
844864fbae66935951529408831c2f22367a57b6
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6
scsi: megasas: null terminate bios version buffer While reading information via 'megasas_ctrl_get_info' routine, a local bios version buffer isn't null terminated. Add the terminating null byte to avoid any OOB access. Reported-by: Li Qiang <liqiang6-s@360.cn> Reviewed-by: Peter Maydell <peter.maydell@linaro.org> Sig...
1
static int megasas_ctrl_get_info(MegasasState *s, MegasasCmd *cmd) { PCIDevice *pci_dev = PCI_DEVICE(s); PCIDeviceClass *pci_class = PCI_DEVICE_GET_CLASS(pci_dev); MegasasBaseClass *base_class = MEGASAS_DEVICE_GET_CLASS(s); struct mfi_ctrl_info info; size_t dcmd_size = sizeof(info); BusChild *ki...
340,248,343,264,835,060,000,000,000,000,000,000,000
megasas.c
35,182,564,994,204,110,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2016-5337
The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
https://nvd.nist.gov/vuln/detail/CVE-2016-5337
194,690
qemu
844864fbae66935951529408831c2f22367a57b6
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6
scsi: megasas: null terminate bios version buffer While reading information via 'megasas_ctrl_get_info' routine, a local bios version buffer isn't null terminated. Add the terminating null byte to avoid any OOB access. Reported-by: Li Qiang <liqiang6-s@360.cn> Reviewed-by: Peter Maydell <peter.maydell@linaro.org> Sig...
0
static int megasas_ctrl_get_info(MegasasState *s, MegasasCmd *cmd) { PCIDevice *pci_dev = PCI_DEVICE(s); PCIDeviceClass *pci_class = PCI_DEVICE_GET_CLASS(pci_dev); MegasasBaseClass *base_class = MEGASAS_DEVICE_GET_CLASS(s); struct mfi_ctrl_info info; size_t dcmd_size = sizeof(info); BusChild *ki...
262,999,860,477,650,460,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2016-5337
The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
https://nvd.nist.gov/vuln/detail/CVE-2016-5337
10,720
FFmpeg
c24bcb553650b91e9eff15ef6e54ca73de2453b7
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c24bcb553650b91e9eff15ef6e54ca73de2453b7
avformat/nsvdec: Fix DoS due to lack of eof check in nsvs_file_offset loop. Fixes: 20170829.nsv Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com> Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int nsv_parse_NSVf_header(AVFormatContext *s) { NSVContext *nsv = s->priv_data; AVIOContext *pb = s->pb; unsigned int av_unused file_size; unsigned int size; int64_t duration; int strings_size; int table_entries; int table_entries_used; nsv->state = NSV_UNSYNC; /* in case we ...
56,714,162,752,573,535,000,000,000,000,000,000,000
nsvdec.c
37,860,070,422,108,427,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-14171
In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 't...
https://nvd.nist.gov/vuln/detail/CVE-2017-14171
159,937
FFmpeg
c24bcb553650b91e9eff15ef6e54ca73de2453b7
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c24bcb553650b91e9eff15ef6e54ca73de2453b7
avformat/nsvdec: Fix DoS due to lack of eof check in nsvs_file_offset loop. Fixes: 20170829.nsv Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com> Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int nsv_parse_NSVf_header(AVFormatContext *s) { NSVContext *nsv = s->priv_data; AVIOContext *pb = s->pb; unsigned int av_unused file_size; unsigned int size; int64_t duration; int strings_size; int table_entries; int table_entries_used; nsv->state = NSV_UNSYNC; /* in case we ...
233,221,989,185,080,140,000,000,000,000,000,000,000
None
null
[ "CWE-834" ]
CVE-2017-14171
In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 't...
https://nvd.nist.gov/vuln/detail/CVE-2017-14171
10,721
php-src
8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
https://github.com/php/php-src
https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
Fix bug #73831 - NULL Pointer Dereference while unserialize php object
1
*/ static void php_wddx_pop_element(void *user_data, const XML_Char *name) { st_entry *ent1, *ent2; wddx_stack *stack = (wddx_stack *)user_data; HashTable *target_hash; zend_class_entry *pce; zval obj; /* OBJECTS_FIXME */ if (stack->top == 0) { return; } if (!strcmp((char *)name, EL_STRING) ||...
51,441,026,749,032,170,000,000,000,000,000,000,000
wddx.c
147,391,937,390,179,960,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10162
The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10162
160,453
php-src
8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
https://github.com/php/php-src
https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
Fix bug #73831 - NULL Pointer Dereference while unserialize php object
0
static void php_wddx_pop_element(void *user_data, const XML_Char *name) { st_entry *ent1, *ent2; wddx_stack *stack = (wddx_stack *)user_data; HashTable *target_hash; zend_class_entry *pce; zval obj; /* OBJECTS_FIXME */ if (stack->top == 0) { return; } if (!strcmp((char *)name, EL_STRING) || !st...
174,047,551,012,994,900,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-10162
The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10162
10,723
libx11
b469da1430cdcee06e31c6251b83aede072a1ff0
https://gitlab.freedesktop.org/xorg/lib/libx11
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0
Fixed off-by-one writes (CVE-2018-14599). The functions XGetFontPath, XListExtensions, and XListFonts are vulnerable to an off-by-one override on malicious server responses. The server replies consist of chunks consisting of a length byte followed by actual string, which is not NUL-terminated. While parsing the resp...
1
char **XListExtensions( register Display *dpy, int *nextensions) /* RETURN */ { xListExtensionsReply rep; char **list = NULL; char *ch = NULL; char *chend; int count = 0; register unsigned i; register int length; _X_UNUSED register xReq *req; unsigned long rlen = 0; LockDisplay(dpy); GetEmptyReq (Li...
163,033,534,115,641,510,000,000,000,000,000,000,000
ListExt.c
320,148,940,157,906,520,000,000,000,000,000,000,000
[ "CWE-682" ]
CVE-2018-14599
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-14599
194,613
libx11
b469da1430cdcee06e31c6251b83aede072a1ff0
https://gitlab.freedesktop.org/xorg/lib/libx11
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0
Fixed off-by-one writes (CVE-2018-14599). The functions XGetFontPath, XListExtensions, and XListFonts are vulnerable to an off-by-one override on malicious server responses. The server replies consist of chunks consisting of a length byte followed by actual string, which is not NUL-terminated. While parsing the resp...
0
char **XListExtensions( register Display *dpy, int *nextensions) /* RETURN */ { xListExtensionsReply rep; char **list = NULL; char *ch = NULL; char *chend; int count = 0; register unsigned i; register int length; _X_UNUSED register xReq *req; unsigned long rlen = 0; LockDisplay(dpy); GetEmptyReq (Li...
197,201,854,500,169,240,000,000,000,000,000,000,000
None
null
[ "CWE-682" ]
CVE-2018-14599
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-14599
10,726
php-src
35ceea928b12373a3b1e3eecdc32ed323223a40d
https://github.com/php/php-src
https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d
Fix bug #67060: use default mode of 660
1
int fpm_unix_resolve_socket_premissions(struct fpm_worker_pool_s *wp) /* {{{ */ { struct fpm_worker_pool_config_s *c = wp->config; /* uninitialized */ wp->socket_uid = -1; wp->socket_gid = -1; wp->socket_mode = 0666; if (!c) { return 0; } if (c->listen_owner && *c->listen_owner) { struct passwd *pwd; ...
91,364,791,922,883,400,000,000,000,000,000,000,000
fpm_unix.c
34,662,802,751,318,727,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0185
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
https://nvd.nist.gov/vuln/detail/CVE-2014-0185
159,071
php-src
35ceea928b12373a3b1e3eecdc32ed323223a40d
https://github.com/php/php-src
https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d
Fix bug #67060: use default mode of 660
0
int fpm_unix_resolve_socket_premissions(struct fpm_worker_pool_s *wp) /* {{{ */ { struct fpm_worker_pool_config_s *c = wp->config; /* uninitialized */ wp->socket_uid = -1; wp->socket_gid = -1; wp->socket_mode = 0660; if (!c) { return 0; } if (c->listen_owner && *c->listen_owner) { struct passwd *pw...
132,215,415,946,904,100,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2014-0185
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
https://nvd.nist.gov/vuln/detail/CVE-2014-0185
10,727
WavPack
33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
issue #68: clear WaveHeader at start to prevent uninitialized read
1
int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t total_samples = 0, infilesize; Wave64ChunkHeader chunk_header; Wave64FileHeader filehdr; WaveHeader WaveHeader; int format_chunk = 0; uint32_t bcount; infilesize ...
277,131,272,340,638,830,000,000,000,000,000,000,000
wave64.c
277,994,324,779,500,450,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-1010319
WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavP...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010319