idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
194,906 | redis | 9fdcc15962f9ff4baebe6fdd947816f43f730d50 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50 | Security: fix redis-cli buffer overflow.
Thanks to Fakhri Zulkifli for reporting it.
The fix switched to dynamic allocation, copying the final prompt in the
static buffer only at the end. | 0 | static void cliRefreshPrompt(void) {
if (config.eval_ldb) return;
sds prompt = sdsempty();
if (config.hostsocket != NULL) {
prompt = sdscatfmt(prompt,"redis %s",config.hostsocket);
} else {
char addr[256];
anetFormatAddr(addr, sizeof(addr), config.hostip, config.hostport);
... | 213,354,082,345,114,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-12326 | Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument fro... | https://nvd.nist.gov/vuln/detail/CVE-2018-12326 |
10,600 | PDFGen | ee58aff6918b8bbc3be29b9e3089485ea46ff956 | https://github.com/AndreRenaud/PDFGen | https://github.com/AndreRenaud/PDFGen/commit/ee58aff6918b8bbc3be29b9e3089485ea46ff956 | jpeg: Fix another possible buffer overrun
Found via the clang libfuzzer | 1 | static int jpeg_size(unsigned char* data, unsigned int data_size,
int *width, int *height)
{
int i = 0;
if (i + 3 < data_size && data[i] == 0xFF && data[i+1] == 0xD8 &&
data[i+2] == 0xFF && data[i+3] == 0xE0) {
i += 4;
if(i + 6 < data_size &&
data... | 283,638,409,723,498,760,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11363 | jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read. | https://nvd.nist.gov/vuln/detail/CVE-2018-11363 |
194,907 | PDFGen | ee58aff6918b8bbc3be29b9e3089485ea46ff956 | https://github.com/AndreRenaud/PDFGen | https://github.com/AndreRenaud/PDFGen/commit/ee58aff6918b8bbc3be29b9e3089485ea46ff956 | jpeg: Fix another possible buffer overrun
Found via the clang libfuzzer | 0 | static int jpeg_size(unsigned char* data, unsigned int data_size,
int *width, int *height)
{
int i = 0;
if (i + 3 < data_size && data[i] == 0xFF && data[i+1] == 0xD8 &&
data[i+2] == 0xFF && data[i+3] == 0xE0) {
i += 4;
if(i + 6 < data_size &&
data... | 113,437,429,362,435,460,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11363 | jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read. | https://nvd.nist.gov/vuln/detail/CVE-2018-11363 |
10,601 | redis | e89086e09a38cc6713bcd4b9c29abf92cf393936 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 | Security: fix Lua struct package offset handling.
After the first fix to the struct package I found another similar
problem, which is fixed by this patch. It could be reproduced easily by
running the following script:
return struct.unpack('f', "xxxxxxxxxxxxx",-3)
The above will access bytes before the 'data' poi... | 1 | static int b_unpack (lua_State *L) {
Header h;
const char *fmt = luaL_checkstring(L, 1);
size_t ld;
const char *data = luaL_checklstring(L, 2, &ld);
size_t pos = luaL_optinteger(L, 3, 1) - 1;
int n = 0; /* number of results */
defaultoptions(&h);
while (*fmt) {
int opt = *fmt++;
size_t ... | 173,966,888,912,004,300,000,000,000,000,000,000,000 | lua_struct.c | 181,615,881,789,836,040,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-11219 | An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking. | https://nvd.nist.gov/vuln/detail/CVE-2018-11219 |
194,908 | redis | e89086e09a38cc6713bcd4b9c29abf92cf393936 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 | Security: fix Lua struct package offset handling.
After the first fix to the struct package I found another similar
problem, which is fixed by this patch. It could be reproduced easily by
running the following script:
return struct.unpack('f', "xxxxxxxxxxxxx",-3)
The above will access bytes before the 'data' poi... | 0 | static int b_unpack (lua_State *L) {
Header h;
const char *fmt = luaL_checkstring(L, 1);
size_t ld;
const char *data = luaL_checklstring(L, 2, &ld);
size_t pos = luaL_optinteger(L, 3, 1);
luaL_argcheck(L, pos > 0, 3, "offset must be 1 or greater");
pos--; /* Lua indexes are 1-based, but here we want 0-... | 258,237,763,990,239,040,000,000,000,000,000,000,000 | lua_struct.c | 266,137,065,157,491,940,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-11219 | An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking. | https://nvd.nist.gov/vuln/detail/CVE-2018-11219 |
10,607 | openmpt | 492022c7297ede682161d9c0ec2de15526424e76 | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76 | None | 1 | std::vector<GetLengthType> CSoundFile::GetLength(enmGetLengthResetMode adjustMode, GetLengthTarget target)
{
std::vector<GetLengthType> results;
GetLengthType retval;
retval.startOrder = target.startOrder;
retval.startRow = target.startRow;
const bool hasSearchTarget = target.mode != GetLengthTarget::NoTarget;
c... | 139,424,168,971,208,380,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-10017 | soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before 0.3.8 allows remote attackers to cause a denial of service (out-of-bounds read) via an IT or MO3 file with many nested pattern loops. | https://nvd.nist.gov/vuln/detail/CVE-2018-10017 |
194,914 | openmpt | 492022c7297ede682161d9c0ec2de15526424e76 | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76 | None | 0 | std::vector<GetLengthType> CSoundFile::GetLength(enmGetLengthResetMode adjustMode, GetLengthTarget target)
{
std::vector<GetLengthType> results;
GetLengthType retval;
retval.startOrder = target.startOrder;
retval.startRow = target.startRow;
const bool hasSearchTarget = target.mode != GetLengthTarget::NoTarget;
c... | 38,966,371,194,494,637,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-10017 | soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before 0.3.8 allows remote attackers to cause a denial of service (out-of-bounds read) via an IT or MO3 file with many nested pattern loops. | https://nvd.nist.gov/vuln/detail/CVE-2018-10017 |
10,608 | libevt | 444ca3ce7853538c577e0ec3f6146d2d65780734 | https://github.com/libyal/libevt | https://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734 | None | 1 | int libevt_record_values_read_event(
libevt_record_values_t *record_values,
uint8_t *record_data,
size_t record_data_size,
uint8_t strict_mode,
libcerror_error_t **error )
{
static char *function = "libevt_record_values_read_event";
size_t record_data_offset = 0;
size_t strings_data_of... | 288,479,666,967,874,900,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-8754 | The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub | https://nvd.nist.gov/vuln/detail/CVE-2018-8754 |
194,915 | libevt | 444ca3ce7853538c577e0ec3f6146d2d65780734 | https://github.com/libyal/libevt | https://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734 | None | 0 | int libevt_record_values_read_event(
libevt_record_values_t *record_values,
uint8_t *record_data,
size_t record_data_size,
uint8_t strict_mode,
libcerror_error_t **error )
{
static char *function = "libevt_record_values_read_event";
size_t record_data_offset = 0;
size_t strings_data_of... | 132,649,440,970,874,600,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-8754 | The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub | https://nvd.nist.gov/vuln/detail/CVE-2018-8754 |
10,616 | gifsicle | 118a46090c50829dc543179019e6140e1235f909 | https://github.com/kohler/gifsicle | https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909 | gif_read: Set last_name = NULL unconditionally.
With a non-malicious GIF, last_name is set to NULL when a name
extension is followed by an image. Reported in #117, via
Debian, via a KAIST fuzzing program. | 1 | read_gif(Gif_Reader *grr, int read_flags,
const char* landmark, Gif_ReadErrorHandler handler)
{
Gif_Stream *gfs;
Gif_Image *gfi;
Gif_Context gfc;
int unknown_block_type = 0;
if (gifgetc(grr) != 'G' ||
gifgetc(grr) != 'I' ||
gifgetc(grr) != 'F')
return 0;
(void)gifgetc(grr);
(void)gifget... | 145,328,850,450,328,550,000,000,000,000,000,000,000 | gifread.c | 329,987,187,594,896,880,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18120 | A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421. | https://nvd.nist.gov/vuln/detail/CVE-2017-18120 |
194,923 | gifsicle | 118a46090c50829dc543179019e6140e1235f909 | https://github.com/kohler/gifsicle | https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909 | gif_read: Set last_name = NULL unconditionally.
With a non-malicious GIF, last_name is set to NULL when a name
extension is followed by an image. Reported in #117, via
Debian, via a KAIST fuzzing program. | 0 | read_gif(Gif_Reader *grr, int read_flags,
const char* landmark, Gif_ReadErrorHandler handler)
{
Gif_Stream *gfs;
Gif_Image *gfi;
Gif_Context gfc;
int unknown_block_type = 0;
if (gifgetc(grr) != 'G' ||
gifgetc(grr) != 'I' ||
gifgetc(grr) != 'F')
return 0;
(void)gifgetc(grr);
(void)gifget... | 219,899,033,143,943,050,000,000,000,000,000,000,000 | gifread.c | 127,741,728,004,191,690,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18120 | A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421. | https://nvd.nist.gov/vuln/detail/CVE-2017-18120 |
10,617 | rpm | c815822c8bdb138066ff58c624ae83e3a12ebfa9 | https://github.com/rpm-software-management/rpm | https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9 | Make verification match the new restricted directory symlink behavior
Only follow directory symlinks owned by target directory owner or root
during verification to match the behavior of fsmVerify() in the new
CVE-2017-7500 world order.
The code is klunkier than it should and the logic should use common code
with fsmV... | 1 | rpmVerifyAttrs rpmfilesVerify(rpmfiles fi, int ix, rpmVerifyAttrs omitMask)
{
rpm_mode_t fmode = rpmfilesFMode(fi, ix);
rpmfileAttrs fileAttrs = rpmfilesFFlags(fi, ix);
rpmVerifyAttrs flags = rpmfilesVFlags(fi, ix);
const char * fn = rpmfilesFN(fi, ix);
struct stat sb;
rpmVerifyAttrs vfy = RPMVE... | 253,992,275,898,542,300,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2017-7500 | It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory... | https://nvd.nist.gov/vuln/detail/CVE-2017-7500 |
194,924 | rpm | c815822c8bdb138066ff58c624ae83e3a12ebfa9 | https://github.com/rpm-software-management/rpm | https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9 | Make verification match the new restricted directory symlink behavior
Only follow directory symlinks owned by target directory owner or root
during verification to match the behavior of fsmVerify() in the new
CVE-2017-7500 world order.
The code is klunkier than it should and the logic should use common code
with fsmV... | 0 | rpmVerifyAttrs rpmfilesVerify(rpmfiles fi, int ix, rpmVerifyAttrs omitMask)
{
rpm_mode_t fmode = rpmfilesFMode(fi, ix);
rpmfileAttrs fileAttrs = rpmfilesFFlags(fi, ix);
rpmVerifyAttrs flags = rpmfilesVFlags(fi, ix);
const char * fn = rpmfilesFN(fi, ix);
struct stat sb;
rpmVerifyAttrs vfy = RPMVE... | 157,745,764,923,260,070,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2017-7500 | It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory... | https://nvd.nist.gov/vuln/detail/CVE-2017-7500 |
10,625 | optee_os | 7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | core: clear the entire TA area
Previously we cleared (memset to zero) the size corresponding to code
and data segments, however the allocation for the TA is made on the
granularity of the memory pool, meaning that we did not clear all memory
and because of that we could potentially leak code and data of a
previous loa... | 1 | static struct mobj *alloc_ta_mem(size_t size)
{
#ifdef CFG_PAGED_USER_TA
return mobj_paged_alloc(size);
#else
struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr);
if (mobj)
memset(mobj_get_va(mobj, 0), 0, size);
return mobj;
#endif
}
| 333,142,874,986,827,700,000,000,000,000,000,000,000 | user_ta.c | 248,720,455,099,418,000,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2019-1010294 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010294 |
194,929 | optee_os | 7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | core: clear the entire TA area
Previously we cleared (memset to zero) the size corresponding to code
and data segments, however the allocation for the TA is made on the
granularity of the memory pool, meaning that we did not clear all memory
and because of that we could potentially leak code and data of a
previous loa... | 0 | static struct mobj *alloc_ta_mem(size_t size)
{
#ifdef CFG_PAGED_USER_TA
return mobj_paged_alloc(size);
#else
struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr);
if (mobj) {
size_t granularity = BIT(tee_mm_sec_ddr.shift);
/* Round up to allocation granularity size */
memset(mobj_get_va... | 98,628,311,870,220,710,000,000,000,000,000,000,000 | user_ta.c | 100,472,334,477,367,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2019-1010294 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010294 |
10,626 | optee_os | 95f36d661f2b75887772ea28baaad904bde96970 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/95f36d661f2b75887772ea28baaad904bde96970 | core: tee_mmu_check_access_rights() check all pages
Prior to this patch tee_mmu_check_access_rights() checks an address in
each page of a supplied range. If both the start and length of that
range is unaligned the last page in the range is sometimes not checked.
With this patch the first address of each page in the ra... | 1 | TEE_Result tee_mmu_check_access_rights(const struct user_ta_ctx *utc,
uint32_t flags, uaddr_t uaddr,
size_t len)
{
uaddr_t a;
size_t addr_incr = MIN(CORE_MMU_USER_CODE_SIZE,
CORE_MMU_USER_PARAM_SIZE);
if (ADD_OVERFLOW(uaddr, len, &a))
return TEE_ERROR_ACCESS_DENIED;
if (... | 309,046,461,438,464,900,000,000,000,000,000,000,000 | tee_mmu.c | 177,418,137,153,567,150,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010293 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Boundary crossing. The impact is: Memory corruption of the TEE itself. The component is: optee_os. The fixed version is: 3.4.0 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010293 |
194,930 | optee_os | 95f36d661f2b75887772ea28baaad904bde96970 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/95f36d661f2b75887772ea28baaad904bde96970 | core: tee_mmu_check_access_rights() check all pages
Prior to this patch tee_mmu_check_access_rights() checks an address in
each page of a supplied range. If both the start and length of that
range is unaligned the last page in the range is sometimes not checked.
With this patch the first address of each page in the ra... | 0 | TEE_Result tee_mmu_check_access_rights(const struct user_ta_ctx *utc,
uint32_t flags, uaddr_t uaddr,
size_t len)
{
uaddr_t a;
uaddr_t end_addr = 0;
size_t addr_incr = MIN(CORE_MMU_USER_CODE_SIZE,
CORE_MMU_USER_PARAM_SIZE);
if (ADD_OVERFLOW(uaddr, len, &end_addr))
return TEE... | 305,359,928,372,886,040,000,000,000,000,000,000,000 | tee_mmu.c | 278,891,687,540,339,400,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010293 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Boundary crossing. The impact is: Memory corruption of the TEE itself. The component is: optee_os. The fixed version is: 3.4.0 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010293 |
10,627 | optee_os | e3adcf566cb278444830e7badfdcc3983e334fd1 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/e3adcf566cb278444830e7badfdcc3983e334fd1 | core: ensure that supplied range matches MOBJ
In set_rmem_param() if the MOBJ is found by the cookie it's verified to
represent non-secure shared memory. Prior to this patch the supplied
sub-range to be used of the MOBJ was not checked here and relied on
later checks further down the chain. Those checks seems to be en... | 1 | static TEE_Result set_rmem_param(const struct optee_msg_param_rmem *rmem,
struct param_mem *mem)
{
uint64_t shm_ref = READ_ONCE(rmem->shm_ref);
mem->mobj = mobj_reg_shm_get_by_cookie(shm_ref);
if (!mem->mobj)
return TEE_ERROR_BAD_PARAMETERS;
mem->offs = READ_ONCE(rmem->offs);
mem->size = READ_ONCE... | 15,438,417,749,328,557,000,000,000,000,000,000,000 | entry_std.c | 253,309,200,136,308,440,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-1010292 | Linaro/OP-TEE OP-TEE Prior to version v3.4.0 is affected by: Boundary checks. The impact is: This could lead to corruption of any memory which the TA can access. The component is: optee_os. The fixed version is: v3.4.0. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010292 |
194,931 | optee_os | e3adcf566cb278444830e7badfdcc3983e334fd1 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/e3adcf566cb278444830e7badfdcc3983e334fd1 | core: ensure that supplied range matches MOBJ
In set_rmem_param() if the MOBJ is found by the cookie it's verified to
represent non-secure shared memory. Prior to this patch the supplied
sub-range to be used of the MOBJ was not checked here and relied on
later checks further down the chain. Those checks seems to be en... | 0 | static TEE_Result set_rmem_param(const struct optee_msg_param_rmem *rmem,
struct param_mem *mem)
{
size_t req_size = 0;
uint64_t shm_ref = READ_ONCE(rmem->shm_ref);
mem->mobj = mobj_reg_shm_get_by_cookie(shm_ref);
if (!mem->mobj)
return TEE_ERROR_BAD_PARAMETERS;
mem->offs = READ_ONCE(rmem->offs);
... | 149,717,132,743,521,740,000,000,000,000,000,000,000 | entry_std.c | 222,676,104,212,434,780,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-1010292 | Linaro/OP-TEE OP-TEE Prior to version v3.4.0 is affected by: Boundary checks. The impact is: This could lead to corruption of any memory which the TA can access. The component is: optee_os. The fixed version is: v3.4.0. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010292 |
10,628 | openmpt | 927688ddab43c2b203569de79407a899e734fabe | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe | [Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff... | 1 | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
unsigned int retval;
size_t tmpretval;
if(!file) return 0;
str = openmpt_module_get_instrument_name(file->mod,qual-1);
if(!str){
if(buff){
*buff = '\0';
}
return 0;
}
tmp... | 12,124,114,212,897,463,000,000,000,000,000,000,000 | libopenmpt_modplug.c | 274,418,101,621,125,500,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-17113 | In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17113 |
194,932 | openmpt | 927688ddab43c2b203569de79407a899e734fabe | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe | [Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff... | 0 | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
char buf[32];
if(!file) return 0;
str = openmpt_module_get_instrument_name(file->mod,qual-1);
memset(buf,0,32);
if(str){
strncpy(buf,str,31);
openmpt_free_string(str);
}
if(... | 337,944,683,734,698,800,000,000,000,000,000,000,000 | libopenmpt_modplug.c | 263,530,517,036,676,950,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-17113 | In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17113 |
10,629 | openmpt | 927688ddab43c2b203569de79407a899e734fabe | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe | [Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff... | 1 | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_SampleName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
unsigned int retval;
size_t tmpretval;
if(!file) return 0;
str = openmpt_module_get_sample_name(file->mod,qual-1);
if(!str){
if(buff){
*buff = '\0';
}
return 0;
}
tmpretval =... | 294,694,415,044,715,340,000,000,000,000,000,000,000 | libopenmpt_modplug.c | 274,418,101,621,125,500,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-17113 | In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17113 |
194,933 | openmpt | 927688ddab43c2b203569de79407a899e734fabe | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe | [Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff... | 0 | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_SampleName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
char buf[32];
if(!file) return 0;
str = openmpt_module_get_sample_name(file->mod,qual-1);
memset(buf,0,32);
if(str){
strncpy(buf,str,31);
openmpt_free_string(str);
}
if(buff){
... | 318,037,397,692,104,100,000,000,000,000,000,000,000 | libopenmpt_modplug.c | 263,530,517,036,676,950,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-17113 | In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17113 |
10,636 | pam-u2f | 7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3 | https://github.com/Yubico/pam-u2f | https://github.com/Yubico/pam-u2f/commit/7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3 | Drop privileges by default when opening user-related files
The module is typically executed as root and would sometimes
open files or follow symlinks that could be controlled from the
outside.
Drop privileges to the target user before opening any files.
Fixes CVE-2019-12209.
Thanks to Matthias Gerstner of the SUSE ... | 1 | int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc,
const char **argv) {
struct passwd *pw = NULL, pw_s;
const char *user = NULL;
cfg_t cfg_st;
cfg_t *cfg = &cfg_st;
char buffer[BUFSIZE];
char *buf = NULL;
char *authfile_dir;
size_t authfile_dir_len;
int pgu_ret,... | 247,266,602,847,718,400,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2019-12209 | Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part o... | https://nvd.nist.gov/vuln/detail/CVE-2019-12209 |
194,938 | pam-u2f | 7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3 | https://github.com/Yubico/pam-u2f | https://github.com/Yubico/pam-u2f/commit/7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3 | Drop privileges by default when opening user-related files
The module is typically executed as root and would sometimes
open files or follow symlinks that could be controlled from the
outside.
Drop privileges to the target user before opening any files.
Fixes CVE-2019-12209.
Thanks to Matthias Gerstner of the SUSE ... | 0 | int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc,
const char **argv) {
struct passwd *pw = NULL, pw_s;
const char *user = NULL;
cfg_t cfg_st;
cfg_t *cfg = &cfg_st;
char buffer[BUFSIZE];
char *buf = NULL;
char *authfile_dir;
size_t authfile_dir_len;
int pgu_ret,... | 70,870,740,254,689,090,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2019-12209 | Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part o... | https://nvd.nist.gov/vuln/detail/CVE-2019-12209 |
10,640 | ext-http | 17137d4ab1ce81a2cee0fae842340a344ef3da83 | https://github.com/m6w6/ext-http | https://github.com/m6w6/ext-http/commit/17137d4ab1ce81a2cee0fae842340a344ef3da83 | fix bug #73055 | 1 | static void merge_param(HashTable *params, zval *zdata, zval ***current_param, zval ***current_args TSRMLS_DC)
{
zval **ptr, **zdata_ptr;
php_http_array_hashkey_t hkey = php_http_array_hashkey_init(0);
#if 0
{
zval tmp;
INIT_PZVAL_ARRAY(&tmp, params);
fprintf(stderr, "params = ");
zend_print_zval_r(&tmp, 1 ... | 164,440,707,986,027,160,000,000,000,000,000,000,000 | php_http_params.c | 161,963,913,583,805,180,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2016-7398 | A type confusion vulnerability in the merge_param() function of php_http_params.c in PHP's pecl-http extension 3.1.0beta2 (PHP 7) and earlier as well as 2.6.0beta2 (PHP 5) and earlier allows attackers to crash PHP and possibly execute arbitrary code via crafted HTTP requests. | https://nvd.nist.gov/vuln/detail/CVE-2016-7398 |
194,944 | ext-http | 17137d4ab1ce81a2cee0fae842340a344ef3da83 | https://github.com/m6w6/ext-http | https://github.com/m6w6/ext-http/commit/17137d4ab1ce81a2cee0fae842340a344ef3da83 | fix bug #73055 | 0 | static void merge_param(HashTable *params, zval *zdata, zval ***current_param, zval ***current_args TSRMLS_DC)
{
zval **ptr, **zdata_ptr;
php_http_array_hashkey_t hkey = php_http_array_hashkey_init(0);
#if 0
{
zval tmp;
INIT_PZVAL_ARRAY(&tmp, params);
fprintf(stderr, "params = ");
zend_print_zval_r(&tmp, 1 ... | 268,654,700,151,419,160,000,000,000,000,000,000,000 | php_http_params.c | 147,387,979,765,345,000,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2016-7398 | A type confusion vulnerability in the merge_param() function of php_http_params.c in PHP's pecl-http extension 3.1.0beta2 (PHP 7) and earlier as well as 2.6.0beta2 (PHP 5) and earlier allows attackers to crash PHP and possibly execute arbitrary code via crafted HTTP requests. | https://nvd.nist.gov/vuln/detail/CVE-2016-7398 |
10,642 | bdwgc | be9df82919960214ee4b9d3313523bff44fd99e1 | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1 | Fix allocation size overflows due to rounding.
* malloc.c (GC_generic_malloc): Check if the allocation size is
rounded to a smaller value.
* mallocx.c (GC_generic_malloc_ignore_off_page): Likewise. | 1 | GC_INNER void * GC_generic_malloc_ignore_off_page(size_t lb, int k)
{
void *result;
size_t lg;
size_t lb_rounded;
word n_blocks;
GC_bool init;
DCL_LOCK_STATE;
if (SMALL_OBJ(lb))
return(GC_generic_malloc((word)lb, k));
lg = ROUNDED_UP_GRANULES(lb);
lb_rounded = GRANULES_TO... | 174,440,046,177,171,580,000,000,000,000,000,000,000 | mallocx.c | 4,482,882,771,485,867,500,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
194,945 | bdwgc | be9df82919960214ee4b9d3313523bff44fd99e1 | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1 | Fix allocation size overflows due to rounding.
* malloc.c (GC_generic_malloc): Check if the allocation size is
rounded to a smaller value.
* mallocx.c (GC_generic_malloc_ignore_off_page): Likewise. | 0 | GC_INNER void * GC_generic_malloc_ignore_off_page(size_t lb, int k)
{
void *result;
size_t lg;
size_t lb_rounded;
word n_blocks;
GC_bool init;
DCL_LOCK_STATE;
if (SMALL_OBJ(lb))
return(GC_generic_malloc((word)lb, k));
lg = ROUNDED_UP_GRANULES(lb);
lb_rounded = GRANULES_TO... | 220,297,858,673,001,670,000,000,000,000,000,000,000 | mallocx.c | 123,389,046,630,789,940,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
10,644 | bdwgc | 83231d0ab5ed60015797c3d1ad9056295ac3b2bb | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/83231d0ab5ed60015797c3d1ad9056295ac3b2bb | Speedup calloc size overflow check by preventing division if small values
* malloc.c (GC_SQRT_SIZE_MAX): New macro.
* malloc.c (calloc): Add fast initial size overflow check to avoid
integer division for reasonably small values passed. | 1 | void * calloc(size_t n, size_t lb)
{
if (lb && n > GC_SIZE_MAX / lb)
return NULL;
# if defined(GC_LINUX_THREADS) /* && !defined(USE_PROC_FOR_LIBRARIES) */
/* libpthread allocated some memory that is only pointed to by */
/* mmapped thread stacks. Make sure it's not collectable. *... | 286,136,948,008,637,870,000,000,000,000,000,000,000 | malloc.c | 209,968,943,630,946,800,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
194,946 | bdwgc | 83231d0ab5ed60015797c3d1ad9056295ac3b2bb | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/83231d0ab5ed60015797c3d1ad9056295ac3b2bb | Speedup calloc size overflow check by preventing division if small values
* malloc.c (GC_SQRT_SIZE_MAX): New macro.
* malloc.c (calloc): Add fast initial size overflow check to avoid
integer division for reasonably small values passed. | 0 | void * calloc(size_t n, size_t lb)
{
if ((lb | n) > GC_SQRT_SIZE_MAX /* fast initial test */
&& lb && n > GC_SIZE_MAX / lb)
return NULL;
# if defined(GC_LINUX_THREADS) /* && !defined(USE_PROC_FOR_LIBRARIES) */
/* libpthread allocated some memory that is only pointed to by */
/*... | 178,088,042,193,459,000,000,000,000,000,000,000,000 | malloc.c | 330,806,026,827,025,870,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
10,651 | OpenJK | f61fe5f6a0419ef4a88d46a128052f2e8352e85d | https://github.com/JACoders/OpenJK | https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d | None | 1 | qboolean S_AL_Init( soundInterface_t *si )
{
#ifdef USE_OPENAL
const char* device = NULL;
const char* inputdevice = NULL;
int i;
if( !si ) {
return qfalse;
}
for (i = 0; i < MAX_RAW_STREAMS; i++) {
streamSourceHandles[i] = -1;
streamPlaying[i] = qfalse;
streamSources[i] = 0;
streamNumBuffers[i] = 0;
... | 150,263,890,990,416,820,000,000,000,000,000,000,000 | None | null | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
194,949 | OpenJK | f61fe5f6a0419ef4a88d46a128052f2e8352e85d | https://github.com/JACoders/OpenJK | https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d | None | 0 | qboolean S_AL_Init( soundInterface_t *si )
{
#ifdef USE_OPENAL
const char* device = NULL;
const char* inputdevice = NULL;
int i;
if( !si ) {
return qfalse;
}
for (i = 0; i < MAX_RAW_STREAMS; i++) {
streamSourceHandles[i] = -1;
streamPlaying[i] = qfalse;
streamSources[i] = 0;
streamNumBuffers[i] = 0;
... | 8,417,204,272,080,032,000,000,000,000,000,000,000 | None | null | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
10,663 | redis | 1eb08bcd4634ae42ec45e8284923ac048beaa4c3 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 | Security: update Lua struct package for security.
During an auditing Apple found that the "struct" Lua package
we ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains
a security problem. A bound-checking statement fails because of integer
overflow. The bug exists since we initially integrated this pac... | 1 | static int getnum (lua_State *L, const char **fmt, int df) {
if (!isdigit(**fmt)) /* no number? */
return df; /* return default value */
else {
int a = 0;
do {
if (a > (INT_MAX / 10) || a * 10 > (INT_MAX - (**fmt - '0')))
luaL_error(L, "integral size overflow");
a = a*10 + *(... | 107,382,855,017,923,050,000,000,000,000,000,000,000 | lua_struct.c | 314,192,746,630,728,530,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-14147 | An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which trigger... | https://nvd.nist.gov/vuln/detail/CVE-2020-14147 |
194,960 | redis | 1eb08bcd4634ae42ec45e8284923ac048beaa4c3 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 | Security: update Lua struct package for security.
During an auditing Apple found that the "struct" Lua package
we ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains
a security problem. A bound-checking statement fails because of integer
overflow. The bug exists since we initially integrated this pac... | 0 | static int getnum (lua_State *L, const char **fmt, int df) {
static int getnum (const char **fmt, int df) {
if (!isdigit(**fmt)) /* no number? */
return df; /* return default value */
else {
int a = 0;
do {
a = a*10 + *((*fmt)++) - '0';
} while (isdigit(**fmt));
return a;
}
}
| 36,211,685,942,156,430,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2020-14147 | An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which trigger... | https://nvd.nist.gov/vuln/detail/CVE-2020-14147 |
10,668 | FFmpeg | afc9c683ed9db01edb357bc8c19edad4282b3a97 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/afc9c683ed9db01edb357bc8c19edad4282b3a97 | avformat/asfdec: Fix DoS in asf_build_simple_index()
Fixes: Missing EOF check in loop
No testcase
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int asf_build_simple_index(AVFormatContext *s, int stream_index)
{
ff_asf_guid g;
ASFContext *asf = s->priv_data;
int64_t current_pos = avio_tell(s->pb);
int64_t ret;
if((ret = avio_seek(s->pb, asf->data_object_offset + asf->data_object_size, SEEK_SET)) < 0) {
return ret;
}
... | 185,787,158,206,728,830,000,000,000,000,000,000,000 | asfdec_f.c | 98,577,571,352,562,340,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2017-14223 | In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14223 |
159,933 | FFmpeg | afc9c683ed9db01edb357bc8c19edad4282b3a97 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/afc9c683ed9db01edb357bc8c19edad4282b3a97 | avformat/asfdec: Fix DoS in asf_build_simple_index()
Fixes: Missing EOF check in loop
No testcase
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int asf_build_simple_index(AVFormatContext *s, int stream_index)
{
ff_asf_guid g;
ASFContext *asf = s->priv_data;
int64_t current_pos = avio_tell(s->pb);
int64_t ret;
if((ret = avio_seek(s->pb, asf->data_object_offset + asf->data_object_size, SEEK_SET)) < 0) {
return ret;
}
... | 175,804,409,508,149,660,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2017-14223 | In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14223 |
10,669 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 1 | int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0;
int64_t total_samples = 0, infilesize;
RiffChunkHeader riff_chunk_header;
ChunkHeader chunk_header;
WaveHeader WaveHeader;
... | 51,282,300,993,233,380,000,000,000,000,000,000,000 | riff.c | 243,900,457,214,797,240,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
160,981 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 0 | int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0;
int64_t total_samples = 0, infilesize;
RiffChunkHeader riff_chunk_header;
ChunkHeader chunk_header;
WaveHeader WaveHeader;
... | 196,976,688,496,361,640,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
10,670 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 1 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 140,429,834,578,859,400,000,000,000,000,000,000,000 | dsdiff.c | 256,009,659,393,804,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
160,980 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 0 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 78,576,659,825,872,350,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
10,671 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 1 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
... | 210,565,535,641,398,630,000,000,000,000,000,000,000 | wave64.c | 79,248,399,197,577,640,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
160,982 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 0 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
... | 267,491,405,540,274,750,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
10,672 | file | d7cdad007c507e6c79f51f058dd77fab70ceb9f6 | https://github.com/file/file | https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6 | Stop reporting bad capabilities after the first few. | 1 | doshn(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num,
size_t size, off_t fsize, int *flags, int mach, int strtab)
{
Elf32_Shdr sh32;
Elf64_Shdr sh64;
int stripped = 1;
void *nbuf;
off_t noff, coff, name_off;
uint64_t cap_hw1 = 0; /* SunOS 5.x hardware capabilites */
uint64_t cap_sf1 = ... | 221,056,719,166,951,300,000,000,000,000,000,000,000 | readelf.c | 112,084,290,937,460,670,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2014-8116 | The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. | https://nvd.nist.gov/vuln/detail/CVE-2014-8116 |
158,964 | file | d7cdad007c507e6c79f51f058dd77fab70ceb9f6 | https://github.com/file/file | https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6 | Stop reporting bad capabilities after the first few. | 0 | doshn(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num,
size_t size, off_t fsize, int *flags, int mach, int strtab)
{
Elf32_Shdr sh32;
Elf64_Shdr sh64;
int stripped = 1;
size_t nbadcap = 0;
void *nbuf;
off_t noff, coff, name_off;
uint64_t cap_hw1 = 0; /* SunOS 5.x hardware capabili... | 312,090,184,179,485,900,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-8116 | The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. | https://nvd.nist.gov/vuln/detail/CVE-2014-8116 |
10,673 | linux | 820f9f147dcce2602eefd9b575bbbd9ea14f0953 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953 | fs_pin: Allow for the possibility that m_list or s_list go unused.
This is needed to support lazily umounting locked mounts. Because the
entire unmounted subtree needs to stay together until there are no
users with references to any part of the subtree.
To support this guarantee that the fs_pin m_list and s_list nod... | 1 | void pin_remove(struct fs_pin *pin)
{
spin_lock(&pin_lock);
hlist_del(&pin->m_list);
hlist_del(&pin->s_list);
spin_unlock(&pin_lock);
spin_lock_irq(&pin->wait.lock);
pin->done = 1;
wake_up_locked(&pin->wait);
spin_unlock_irq(&pin->wait.lock);
} | 276,769,003,975,703,430,000,000,000,000,000,000,000 | fs_pin.c | 42,002,380,277,084,830,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-4178 | The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/li... | https://nvd.nist.gov/vuln/detail/CVE-2015-4178 |
184,500 | linux | 820f9f147dcce2602eefd9b575bbbd9ea14f0953 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953 | fs_pin: Allow for the possibility that m_list or s_list go unused.
This is needed to support lazily umounting locked mounts. Because the
entire unmounted subtree needs to stay together until there are no
users with references to any part of the subtree.
To support this guarantee that the fs_pin m_list and s_list nod... | 0 | void pin_remove(struct fs_pin *pin)
{
spin_lock(&pin_lock);
hlist_del_init(&pin->m_list);
hlist_del_init(&pin->s_list);
spin_unlock(&pin_lock);
spin_lock_irq(&pin->wait.lock);
pin->done = 1;
wake_up_locked(&pin->wait);
spin_unlock_irq(&pin->wait.lock);
}
| 137,235,191,729,207,960,000,000,000,000,000,000,000 | fs_pin.c | 159,304,535,075,323,350,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-4178 | The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/li... | https://nvd.nist.gov/vuln/detail/CVE-2015-4178 |
10,675 | qemu | 5193be3be35f29a35bc465036cd64ad60d43385f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=5193be3be35f29a35bc465036cd64ad60d43385f | tsc210x: fix buffer overrun on invalid state load
CVE-2013-4539
s->precision, nextprecision, function and nextfunction
come from wire and are used
as idx into resolution[] in TSC_CUT_RESOLUTION.
Validate after load to avoid buffer overrun.
Cc: Andreas Färber <afaerber@suse.de>
Signed-off-by: Michael S. Tsirkin <mst... | 1 | static int tsc210x_load(QEMUFile *f, void *opaque, int version_id)
{
TSC210xState *s = (TSC210xState *) opaque;
int64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
int i;
s->x = qemu_get_be16(f);
s->y = qemu_get_be16(f);
s->pressure = qemu_get_byte(f);
s->state = qemu_get_byte(f);
s->... | 138,472,856,828,999,150,000,000,000,000,000,000,000 | tsc210x.c | 279,793,609,608,789,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4539 | Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4539 |
194,776 | qemu | 5193be3be35f29a35bc465036cd64ad60d43385f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=5193be3be35f29a35bc465036cd64ad60d43385f | tsc210x: fix buffer overrun on invalid state load
CVE-2013-4539
s->precision, nextprecision, function and nextfunction
come from wire and are used
as idx into resolution[] in TSC_CUT_RESOLUTION.
Validate after load to avoid buffer overrun.
Cc: Andreas Färber <afaerber@suse.de>
Signed-off-by: Michael S. Tsirkin <mst... | 0 | static int tsc210x_load(QEMUFile *f, void *opaque, int version_id)
{
TSC210xState *s = (TSC210xState *) opaque;
int64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
int i;
s->x = qemu_get_be16(f);
s->y = qemu_get_be16(f);
s->pressure = qemu_get_byte(f);
s->state = qemu_get_byte(f);
s->... | 141,640,601,484,357,580,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4539 | Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4539 |
10,676 | FFmpeg | 7d57ca4d9a75562fa32e40766211de150f8b3ee7 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7 | avformat/rtmppkt: Check for packet size mismatches
Fixes out of array access
Found-by: Paul Cher <paulcher@icloud.com>
Reviewed-by: Paul Cher <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int rtmp_packet_read_one_chunk(URLContext *h, RTMPPacket *p,
int chunk_size, RTMPPacket **prev_pkt_ptr,
int *nb_prev_pkt, uint8_t hdr)
{
uint8_t buf[16];
int channel_id, timestamp, size;
uint32_t ts_field; // non-extended ti... | 40,257,325,432,950,084,000,000,000,000,000,000,000 | rtmppkt.c | 141,124,247,872,373,150,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10191 | Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches. | https://nvd.nist.gov/vuln/detail/CVE-2016-10191 |
160,440 | FFmpeg | 7d57ca4d9a75562fa32e40766211de150f8b3ee7 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7 | avformat/rtmppkt: Check for packet size mismatches
Fixes out of array access
Found-by: Paul Cher <paulcher@icloud.com>
Reviewed-by: Paul Cher <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int rtmp_packet_read_one_chunk(URLContext *h, RTMPPacket *p,
int chunk_size, RTMPPacket **prev_pkt_ptr,
int *nb_prev_pkt, uint8_t hdr)
{
uint8_t buf[16];
int channel_id, timestamp, size;
uint32_t ts_field; // non-extended ti... | 328,800,641,748,049,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10191 | Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches. | https://nvd.nist.gov/vuln/detail/CVE-2016-10191 |
10,677 | Espruino | a0d7f432abee692402c00e8b615ff5982dde9780 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780 | Fix stack size detection on Linux (fix #1427) | 1 | size_t jsuGetFreeStack() {
#ifdef ARM
void *frame = __builtin_frame_address(0);
size_t stackPos = (size_t)((char*)frame);
size_t stackEnd = (size_t)((char*)&LINKER_END_VAR);
if (stackPos < stackEnd) return 0; // should never happen, but just in case of overflow!
return stackPos - stackEnd;
#elif defined(LINU... | 330,734,069,179,736,960,000,000,000,000,000,000,000 | jsutils.c | 167,719,314,479,966,560,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-11590 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via an integer overflow during syntax parsing. This was addressed by fixing stack size detection on Linux in jsutils.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11590 |
160,963 | Espruino | a0d7f432abee692402c00e8b615ff5982dde9780 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780 | Fix stack size detection on Linux (fix #1427) | 0 | size_t jsuGetFreeStack() {
#ifdef ARM
void *frame = __builtin_frame_address(0);
size_t stackPos = (size_t)((char*)frame);
size_t stackEnd = (size_t)((char*)&LINKER_END_VAR);
if (stackPos < stackEnd) return 0; // should never happen, but just in case of overflow!
return stackPos - stackEnd;
#elif defined(LINU... | 43,489,234,908,362,470,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-11590 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via an integer overflow during syntax parsing. This was addressed by fixing stack size detection on Linux in jsutils.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11590 |
10,678 | suricata | 11f3659f64a4e42e90cb3c09fcef66894205aefe | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe | teredo: be stricter on what to consider valid teredo
Invalid Teredo can lead to valid DNS traffic (or other UDP traffic)
being misdetected as Teredo. This leads to false negatives in the
UDP payload inspection.
Make the teredo code only consider a packet teredo if the encapsulated
data was decoded without any 'invali... | 1 | int DecodeTeredo(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq)
{
if (!g_teredo_enabled)
return TM_ECODE_FAILED;
uint8_t *start = pkt;
/* Is this packet to short to contain an IPv6 packet ? */
if (len < IPV6_HEADER_LEN)
return TM_ECODE_FA... | 14,393,695,795,783,696,000,000,000,000,000,000,000 | decode-teredo.c | 159,294,858,855,935,220,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
161,139 | suricata | 11f3659f64a4e42e90cb3c09fcef66894205aefe | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe | teredo: be stricter on what to consider valid teredo
Invalid Teredo can lead to valid DNS traffic (or other UDP traffic)
being misdetected as Teredo. This leads to false negatives in the
UDP payload inspection.
Make the teredo code only consider a packet teredo if the encapsulated
data was decoded without any 'invali... | 0 | int DecodeTeredo(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq)
{
if (!g_teredo_enabled)
return TM_ECODE_FAILED;
uint8_t *start = pkt;
/* Is this packet to short to contain an IPv6 packet ? */
if (len < IPV6_HEADER_LEN)
return TM_ECODE_FA... | 123,321,690,728,916,260,000,000,000,000,000,000,000 | decode-teredo.c | 220,157,870,556,823,400,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
10,679 | suricata | 11f3659f64a4e42e90cb3c09fcef66894205aefe | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe | teredo: be stricter on what to consider valid teredo
Invalid Teredo can lead to valid DNS traffic (or other UDP traffic)
being misdetected as Teredo. This leads to false negatives in the
UDP payload inspection.
Make the teredo code only consider a packet teredo if the encapsulated
data was decoded without any 'invali... | 1 | DecodeIPV6ExtHdrs(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq)
{
SCEnter();
uint8_t *orig_pkt = pkt;
uint8_t nh = 0; /* careful, 0 is actually a real type */
uint16_t hdrextlen = 0;
uint16_t plen;
char dstopts = 0;
char exthdr_fh_done = 0;
... | 156,698,936,785,910,100,000,000,000,000,000,000,000 | decode-ipv6.c | 100,517,174,549,297,110,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
161,138 | suricata | 11f3659f64a4e42e90cb3c09fcef66894205aefe | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe | teredo: be stricter on what to consider valid teredo
Invalid Teredo can lead to valid DNS traffic (or other UDP traffic)
being misdetected as Teredo. This leads to false negatives in the
UDP payload inspection.
Make the teredo code only consider a packet teredo if the encapsulated
data was decoded without any 'invali... | 0 | DecodeIPV6ExtHdrs(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq)
{
SCEnter();
uint8_t *orig_pkt = pkt;
uint8_t nh = IPV6_GET_NH(p); /* careful, 0 is actually a real type */
uint16_t hdrextlen = 0;
uint16_t plen = len;
char dstopts = 0;
c... | 58,104,851,008,513,920,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
10,682 | qemu | afbcc40bee4ef51731102d7d4b499ee12fc182e1 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=afbcc40bee4ef51731102d7d4b499ee12fc182e1 | parallels: Fix catalog size integer overflow (CVE-2014-0143)
The first test case would cause a huge memory allocation, leading to a
qemu abort; the second one to a too small malloc() for the catalog
(smaller than s->catalog_size), which causes a read-only out-of-bounds
array access and on big endian hosts an endianess... | 1 | static int parallels_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVParallelsState *s = bs->opaque;
int i;
struct parallels_header ph;
int ret;
bs->read_only = 1; // no write support yet
ret = bdrv_pread(bs->file, 0, &ph, sizeof(ph));
if... | 208,362,155,379,597,650,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
194,797 | qemu | afbcc40bee4ef51731102d7d4b499ee12fc182e1 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=afbcc40bee4ef51731102d7d4b499ee12fc182e1 | parallels: Fix catalog size integer overflow (CVE-2014-0143)
The first test case would cause a huge memory allocation, leading to a
qemu abort; the second one to a too small malloc() for the catalog
(smaller than s->catalog_size), which causes a read-only out-of-bounds
array access and on big endian hosts an endianess... | 0 | static int parallels_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVParallelsState *s = bs->opaque;
int i;
struct parallels_header ph;
int ret;
bs->read_only = 1; // no write support yet
ret = bdrv_pread(bs->file, 0, &ph, sizeof(ph));
if... | 281,901,401,885,024,440,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,685 | FFmpeg | bd27a9364ca274ca97f1df6d984e88a0700fb235 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/bd27a9364ca274ca97f1df6d984e88a0700fb235 | avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile
The profile field is changed by code inside and outside the decoder,
its not a reliable indicator of the internal codec state.
Maintaining it consistency with studio_profile is messy.
Its easier to just avoid it and use ... | 1 | static int er_supported(ERContext *s)
{
if(s->avctx->hwaccel && s->avctx->hwaccel->decode_slice ||
!s->cur_pic.f ||
s->cur_pic.field_picture ||
s->avctx->profile == FF_PROFILE_MPEG4_SIMPLE_STUDIO
... | 141,920,714,405,357,940,000,000,000,000,000,000,000 | error_resilience.c | 110,359,710,284,682,150,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-13304 | In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-13304 |
160,913 | FFmpeg | bd27a9364ca274ca97f1df6d984e88a0700fb235 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/bd27a9364ca274ca97f1df6d984e88a0700fb235 | avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile
The profile field is changed by code inside and outside the decoder,
its not a reliable indicator of the internal codec state.
Maintaining it consistency with studio_profile is messy.
Its easier to just avoid it and use ... | 0 | static int er_supported(ERContext *s)
{
if(s->avctx->hwaccel && s->avctx->hwaccel->decode_slice ||
!s->cur_pic.f ||
s->cur_pic.field_picture
)
return 0;
return 1;
}
| 164,432,667,261,191,540,000,000,000,000,000,000,000 | error_resilience.c | 150,366,930,510,644,580,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-13304 | In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-13304 |
10,687 | file | 27a14bc7ba285a0a5ebfdb55e54001aa11932b08 | https://github.com/file/file | https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08 | Correctly compute the truncated pascal string size (Francisco Alonso and
Jan Kaluza at RedHat) | 1 | */
private int
mconvert(struct magic_set *ms, struct magic *m, int flip)
{
union VALUETYPE *p = &ms->ms_value;
uint8_t type;
switch (type = cvt_flip(m->type, flip)) {
case FILE_BYTE:
cvt_8(p, m);
return 1;
case FILE_SHORT:
cvt_16(p, m);
return 1;
case FILE_LONG:
case FILE_DATE:
case FILE_LDATE:
cvt_... | 118,264,346,288,892,310,000,000,000,000,000,000,000 | softmagic.c | 243,897,300,208,014,660,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-3478 | Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion. | https://nvd.nist.gov/vuln/detail/CVE-2014-3478 |
159,023 | file | 27a14bc7ba285a0a5ebfdb55e54001aa11932b08 | https://github.com/file/file | https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08 | Correctly compute the truncated pascal string size (Francisco Alonso and
Jan Kaluza at RedHat) | 0 | mconvert(struct magic_set *ms, struct magic *m, int flip)
{
union VALUETYPE *p = &ms->ms_value;
uint8_t type;
switch (type = cvt_flip(m->type, flip)) {
case FILE_BYTE:
cvt_8(p, m);
return 1;
case FILE_SHORT:
cvt_16(p, m);
return 1;
case FILE_LONG:
case FILE_DATE:
case FILE_LDATE:
cvt_32(p, m);
retu... | 254,524,848,727,113,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3478 | Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion. | https://nvd.nist.gov/vuln/detail/CVE-2014-3478 |
10,692 | systemd | 505b6a61c22d5565e9308045c7b9bf79f7d0517e | https://github.com/systemd/systemd | https://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e | journald: don't accept arbitrarily sized journal data fields
https://bugzilla.redhat.com/show_bug.cgi?id=858746 | 1 | void server_process_native_message(
Server *s,
const void *buffer, size_t buffer_size,
struct ucred *ucred,
struct timeval *tv,
const char *label, size_t label_len) {
struct iovec *iovec = NULL;
unsigned n = 0, m = 0, j, tn... | 206,165,572,902,001,330,000,000,000,000,000,000,000 | journald-native.c | 120,038,332,300,868,240,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4391 | Integer overflow in the valid_user_field function in journal/journald-native.c in systemd allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large journal data field, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2013-4391 |
157,925 | systemd | 505b6a61c22d5565e9308045c7b9bf79f7d0517e | https://github.com/systemd/systemd | https://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e | journald: don't accept arbitrarily sized journal data fields
https://bugzilla.redhat.com/show_bug.cgi?id=858746 | 0 | void server_process_native_message(
Server *s,
const void *buffer, size_t buffer_size,
struct ucred *ucred,
struct timeval *tv,
const char *label, size_t label_len) {
struct iovec *iovec = NULL;
unsigned n = 0, m = 0, j, tn... | 176,204,361,052,328,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2013-4391 | Integer overflow in the valid_user_field function in journal/journald-native.c in systemd allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large journal data field, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2013-4391 |
10,693 | WavPack | 8e3fe45a7bac31d9a3b558ae0079e2d92a04799e | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e | issue #28, fix buffer overflows and bad allocs on corrupt CAF files | 1 | int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
uint32_t chan_chunk = 0, channel_layout = 0, bcount;
unsigned char *channel_identities = NULL;
unsigned char *channel_reorder = NULL;
int64_t total_samples = 0, infilesize;
CAFFileH... | 248,948,390,429,775,130,000,000,000,000,000,000,000 | caff.c | 180,637,342,133,898,580,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-7254 | The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-7254 |
161,031 | WavPack | 8e3fe45a7bac31d9a3b558ae0079e2d92a04799e | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e | issue #28, fix buffer overflows and bad allocs on corrupt CAF files | 0 | int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
uint32_t chan_chunk = 0, channel_layout = 0, bcount;
unsigned char *channel_identities = NULL;
unsigned char *channel_reorder = NULL;
int64_t total_samples = 0, infilesize;
CAFFileH... | 244,494,973,090,719,350,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-7254 | The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-7254 |
10,708 | qemu | b16c129daf0fed91febbb88de23dae8271c8898a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=b16c129daf0fed91febbb88de23dae8271c8898a | usb: ehci: fix memory leak in ehci_process_itd
While processing isochronous transfer descriptors(iTD), if the page
select(PG) field value is out of bands it will return. In this
situation the ehci's sg list is not freed thus leading to a memory
leak issue. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@36... | 1 | static int ehci_process_itd(EHCIState *ehci,
EHCIitd *itd,
uint32_t addr)
{
USBDevice *dev;
USBEndpoint *ep;
uint32_t i, len, pid, dir, devaddr, endp;
uint32_t pg, off, ptr1, ptr2, max, mult;
ehci->periodic_sched_active = PERIODIC_ACTIVE;
... | 33,948,406,223,871,267,000,000,000,000,000,000,000 | hcd-ehci.c | 236,559,692,809,978,640,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7995 | Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes. | https://nvd.nist.gov/vuln/detail/CVE-2016-7995 |
194,657 | qemu | b16c129daf0fed91febbb88de23dae8271c8898a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=b16c129daf0fed91febbb88de23dae8271c8898a | usb: ehci: fix memory leak in ehci_process_itd
While processing isochronous transfer descriptors(iTD), if the page
select(PG) field value is out of bands it will return. In this
situation the ehci's sg list is not freed thus leading to a memory
leak issue. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@36... | 0 | static int ehci_process_itd(EHCIState *ehci,
EHCIitd *itd,
uint32_t addr)
{
USBDevice *dev;
USBEndpoint *ep;
uint32_t i, len, pid, dir, devaddr, endp;
uint32_t pg, off, ptr1, ptr2, max, mult;
ehci->periodic_sched_active = PERIODIC_ACTIVE;
... | 249,435,086,637,306,350,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2016-7995 | Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes. | https://nvd.nist.gov/vuln/detail/CVE-2016-7995 |
10,709 | radare2 | ead645853a63bf83d8386702cad0cf23b31d7eeb | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/ead645853a63bf83d8386702cad0cf23b31d7eeb | fix #6857 | 1 | static int dex_loadcode(RBinFile *arch, RBinDexObj *bin) {
struct r_bin_t *rbin = arch->rbin;
int i;
int *methods = NULL;
int sym_count = 0;
// doublecheck??
if (!bin || bin->methods_list) {
return false;
}
bin->code_from = UT64_MAX;
bin->code_to = 0;
bin->methods_list = r_list_newf ((RListFree)free);
if ... | 59,972,490,419,326,860,000,000,000,000,000,000,000 | bin_dex.c | 330,647,830,799,263,530,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-6387 | The dex_loadcode function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6387 |
160,333 | radare2 | ead645853a63bf83d8386702cad0cf23b31d7eeb | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/ead645853a63bf83d8386702cad0cf23b31d7eeb | fix #6857 | 0 | static int dex_loadcode(RBinFile *arch, RBinDexObj *bin) {
struct r_bin_t *rbin = arch->rbin;
int i;
int *methods = NULL;
int sym_count = 0;
if (!bin || bin->methods_list) {
return false;
}
bin->code_from = UT64_MAX;
bin->code_to = 0;
bin->methods_list = r_list_newf ((RListFree)free);
if (!bin->methods_lis... | 75,435,306,666,555,000,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-6387 | The dex_loadcode function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6387 |
10,710 | file | 447558595a3650db2886cd2f416ad0beba965801 | https://github.com/file/file | https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801 | PR/313: Aaron Reffett: Check properly for exceeding the offset. | 1 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t count = m->st... | 271,515,507,458,392,820,000,000,000,000,000,000,000 | softmagic.c | 154,882,840,241,016,350,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2270 | softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable. | https://nvd.nist.gov/vuln/detail/CVE-2014-2270 |
159,050 | file | 447558595a3650db2886cd2f416ad0beba965801 | https://github.com/file/file | https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801 | PR/313: Aaron Reffett: Check properly for exceeding the offset. | 0 | mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t count = m->str_range;
int... | 82,959,091,173,486,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-2270 | softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable. | https://nvd.nist.gov/vuln/detail/CVE-2014-2270 |
10,711 | libpcap | 33834cb2a4d035b52aa2a26742f832a112e90a0a | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a | In the open request, reject capture sources that are URLs.
You shouldn't be able to ask a server to open a remote device on some
*other* server; just open it yourself.
This addresses Include Security issue F13: [libpcap] Remote Packet
Capture Daemon Allows Opening Capture URLs. | 1 | daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
char *source, size_t sourcelen)
{
char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
pcap_t *fp; // pcap_t main variable
int nread;
char sendbuf[RPCA... | 213,239,153,397,732,850,000,000,000,000,000,000,000 | daemon.c | 30,742,645,121,715,390,000,000,000,000,000,000,000 | [
"CWE-918"
] | CVE-2019-15164 | rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source. | https://nvd.nist.gov/vuln/detail/CVE-2019-15164 |
161,188 | libpcap | 33834cb2a4d035b52aa2a26742f832a112e90a0a | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a | In the open request, reject capture sources that are URLs.
You shouldn't be able to ask a server to open a remote device on some
*other* server; just open it yourself.
This addresses Include Security issue F13: [libpcap] Remote Packet
Capture Daemon Allows Opening Capture URLs. | 0 | daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
char *source, size_t sourcelen)
{
char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
pcap_t *fp; // pcap_t main variable
int nread;
char sendbuf[RPCA... | 85,154,801,581,540,180,000,000,000,000,000,000,000 | None | null | [
"CWE-918"
] | CVE-2019-15164 | rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source. | https://nvd.nist.gov/vuln/detail/CVE-2019-15164 |
10,712 | libplist | 7391a506352c009fe044dead7baad9e22dd279ee | https://github.com/libimobiledevice/libplist | https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee | plistutil: Prevent OOB heap buffer read by checking input size
As pointed out in #87 plistutil would do a memcmp with a heap buffer
without checking the size. If the size is less than 8 it would read
beyond the bounds of this heap buffer. This commit prevents that. | 1 | int main(int argc, char *argv[])
{
FILE *iplist = NULL;
plist_t root_node = NULL;
char *plist_out = NULL;
uint32_t size = 0;
int read_size = 0;
char *plist_entire = NULL;
struct stat filestats;
options_t *options = parse_arguments(argc, argv);
if (!options)
{
print_usage... | 113,011,307,546,855,480,000,000,000,000,000,000,000 | plistutil.c | 206,884,772,435,069,850,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-5545 | The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. | https://nvd.nist.gov/vuln/detail/CVE-2017-5545 |
160,372 | libplist | 7391a506352c009fe044dead7baad9e22dd279ee | https://github.com/libimobiledevice/libplist | https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee | plistutil: Prevent OOB heap buffer read by checking input size
As pointed out in #87 plistutil would do a memcmp with a heap buffer
without checking the size. If the size is less than 8 it would read
beyond the bounds of this heap buffer. This commit prevents that. | 0 | int main(int argc, char *argv[])
{
FILE *iplist = NULL;
plist_t root_node = NULL;
char *plist_out = NULL;
uint32_t size = 0;
int read_size = 0;
char *plist_entire = NULL;
struct stat filestats;
options_t *options = parse_arguments(argc, argv);
if (!options)
{
print_usage... | 293,414,456,488,667,030,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5545 | The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. | https://nvd.nist.gov/vuln/detail/CVE-2017-5545 |
10,713 | qemu | 3592fe0c919cf27a81d8e9f9b4f269553418bb01 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3592fe0c919cf27a81d8e9f9b4f269553418bb01 | char: serial: check divider value against baud base
16550A UART device uses an oscillator to generate frequencies
(baud base), which decide communication speed. This speed could
be changed by dividing it by a divider. If the divider is
greater than the baud base, speed is set to zero, leading to a
divide by zero error... | 1 | static void serial_update_parameters(SerialState *s)
{
int speed, parity, data_bits, stop_bits, frame_size;
QEMUSerialSetParams ssp;
if (s->divider == 0)
return;
/* Start bit. */
frame_size = 1;
if (s->lcr & 0x08) {
/* Parity bit. */
frame_size++;
if (s->lcr & 0... | 35,876,664,800,758,523,000,000,000,000,000,000,000 | serial.c | 36,261,584,884,359,340,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2016-8669 | The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base. | https://nvd.nist.gov/vuln/detail/CVE-2016-8669 |
194,655 | qemu | 3592fe0c919cf27a81d8e9f9b4f269553418bb01 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3592fe0c919cf27a81d8e9f9b4f269553418bb01 | char: serial: check divider value against baud base
16550A UART device uses an oscillator to generate frequencies
(baud base), which decide communication speed. This speed could
be changed by dividing it by a divider. If the divider is
greater than the baud base, speed is set to zero, leading to a
divide by zero error... | 0 | static void serial_update_parameters(SerialState *s)
{
int speed, parity, data_bits, stop_bits, frame_size;
QEMUSerialSetParams ssp;
if (s->divider == 0 || s->divider > s->baudbase) {
return;
}
/* Start bit. */
frame_size = 1;
/* Parity bit. */
frame_size++;
... | 143,602,637,322,287,840,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-8669 | The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base. | https://nvd.nist.gov/vuln/detail/CVE-2016-8669 |
10,714 | haproxy | efbbdf72992cd20458259962346044cafd9331c0 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy.git;a=commit;h=efbbdf72992cd20458259962346044cafd9331c0 | BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response()
We need to make sure that the record length is not making us read
past the end of the data we received.
Before this patch we could for example read the 16 bytes
corresponding to an AAAA record from the non-initialized part of
the buffer, possibly acce... | 1 | static int dns_validate_dns_response(unsigned char *resp, unsigned char *bufend,
struct dns_resolution *resolution, int max_answer_records)
{
unsigned char *reader;
char *previous_dname, tmpname[DNS_MAX_NAME_SIZE];
int len, flags, offset;
int dns_query_record_id;
int nb_saved_records;
struct dns_query_it... | 318,380,429,260,227,200,000,000,000,000,000,000,000 | dns.c | 245,344,784,117,766,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-20102 | An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was l... | https://nvd.nist.gov/vuln/detail/CVE-2018-20102 |
157,882 | haproxy | efbbdf72992cd20458259962346044cafd9331c0 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy.git;a=commit;h=efbbdf72992cd20458259962346044cafd9331c0 | BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response()
We need to make sure that the record length is not making us read
past the end of the data we received.
Before this patch we could for example read the 16 bytes
corresponding to an AAAA record from the non-initialized part of
the buffer, possibly acce... | 0 | static int dns_validate_dns_response(unsigned char *resp, unsigned char *bufend,
struct dns_resolution *resolution, int max_answer_records)
{
unsigned char *reader;
char *previous_dname, tmpname[DNS_MAX_NAME_SIZE];
int len, flags, offset;
int dns_query_record_id;
int nb_saved_records;
struct dns_query_it... | 269,064,662,063,003,800,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-20102 | An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was l... | https://nvd.nist.gov/vuln/detail/CVE-2018-20102 |
10,715 | libpcap | 437b273761adedcbd880f714bfa44afeec186a31 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31 | Don't crash if crypt() fails.
It can fail, so make sure it doesn't before comparing its result with
the password.
This addresses Include Security issue F12: [libpcap] Remote Packet
Capture Daemon Null Pointer Dereference Denial of Service. | 1 | daemon_AuthUserPwd(char *username, char *password, char *errbuf)
{
#ifdef _WIN32
/*
* Warning: the user which launches the process must have the
* SE_TCB_NAME right.
* This corresponds to have the "Act as part of the Operating System"
* turned on (administrative tools, local security settings, local
* polici... | 63,029,283,185,700,500,000,000,000,000,000,000,000 | daemon.c | 265,153,928,199,968,920,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15163 | rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails. | https://nvd.nist.gov/vuln/detail/CVE-2019-15163 |
161,189 | libpcap | 437b273761adedcbd880f714bfa44afeec186a31 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31 | Don't crash if crypt() fails.
It can fail, so make sure it doesn't before comparing its result with
the password.
This addresses Include Security issue F12: [libpcap] Remote Packet
Capture Daemon Null Pointer Dereference Denial of Service. | 0 | daemon_AuthUserPwd(char *username, char *password, char *errbuf)
{
#ifdef _WIN32
/*
* Warning: the user which launches the process must have the
* SE_TCB_NAME right.
* This corresponds to have the "Act as part of the Operating System"
* turned on (administrative tools, local security settings, local
* polici... | 304,022,479,763,381,920,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-15163 | rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails. | https://nvd.nist.gov/vuln/detail/CVE-2019-15163 |
10,716 | poppler | da63c35549e8852a410946ab016a3f25ac701bdf | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf | FoFiType1C::convertToType0: Fix crash in broken files
Bug #102724 | 1 | void FoFiType1C::convertToType0(char *psName, int *codeMap, int nCodes,
FoFiOutputFunc outputFunc,
void *outputStream) {
int *cidMap;
Type1CIndex subrIdx;
Type1CIndexVal val;
int nCIDs;
GooString *buf;
Type1CEexecBuf eb;
GBool ok;
int fd, i, j, k;
// compute the CID count and build the CID-to... | 147,790,478,051,028,070,000,000,000,000,000,000,000 | FoFiType1C.cc | 140,291,466,668,214,960,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14976 | The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2017-14976 |
157,930 | poppler | da63c35549e8852a410946ab016a3f25ac701bdf | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf | FoFiType1C::convertToType0: Fix crash in broken files
Bug #102724 | 0 | void FoFiType1C::convertToType0(char *psName, int *codeMap, int nCodes,
FoFiOutputFunc outputFunc,
void *outputStream) {
int *cidMap;
Type1CIndex subrIdx;
Type1CIndexVal val;
int nCIDs;
GooString *buf;
Type1CEexecBuf eb;
GBool ok;
int fd, i, j, k;
if (codeMap) {
nCIDs = nCodes;
cidMap... | 311,317,114,939,992,080,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-14976 | The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2017-14976 |
10,717 | WavPack | 36a24c7881427d2e1e4dc1cef58f19eee0d13aec | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec | issue #28, do not overwrite heap on corrupt DSDIFF file | 1 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 129,741,665,744,977,370,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-7253 | The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-7253 |
161,032 | WavPack | 36a24c7881427d2e1e4dc1cef58f19eee0d13aec | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec | issue #28, do not overwrite heap on corrupt DSDIFF file | 0 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 153,574,137,843,800,550,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-7253 | The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-7253 |
10,718 | linux | 0449641130f5652b344ef6fa39fa019d7e94660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660a | ext4: init timer earlier to avoid a kernel panic in __save_error_info
During mount, when we fail to open journal inode or root inode, the
__save_error_info will mod_timer. But actually s_err_report isn't
initialized yet and the kernel oops. The detailed information can
be found https://bugzilla.kernel.org/show_bug.cgi... | 1 | __acquires(kernel_lock)
{
char *orig_data = kstrdup(data, GFP_KERNEL);
struct buffer_head *bh;
struct ext4_super_block *es = NULL;
struct ext4_sb_info *sbi;
ext4_fsblk_t block;
ext4_fsblk_t sb_block = get_sb_block(&data);
ext4_fsblk_t logical_sb_block;
unsigned long offset = 0;
unsigned long journal_devnum... | 2,883,871,233,556,824,000,000,000,000,000,000,000 | super.c | 242,967,321,248,923,500,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-2493 | The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-2493 |
158,686 | linux | 0449641130f5652b344ef6fa39fa019d7e94660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660a | ext4: init timer earlier to avoid a kernel panic in __save_error_info
During mount, when we fail to open journal inode or root inode, the
__save_error_info will mod_timer. But actually s_err_report isn't
initialized yet and the kernel oops. The detailed information can
be found https://bugzilla.kernel.org/show_bug.cgi... | 0 | __releases(kernel_lock)
__acquires(kernel_lock)
{
char *orig_data = kstrdup(data, GFP_KERNEL);
struct buffer_head *bh;
struct ext4_super_block *es = NULL;
struct ext4_sb_info *sbi;
ext4_fsblk_t block;
ext4_fsblk_t sb_block = get_sb_block(&data);
ext4_fsblk_t logical_sb_block;
unsigned long offset = 0;
... | 223,558,280,881,403,080,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2011-2493 | The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-2493 |
10,719 | qemu | 844864fbae66935951529408831c2f22367a57b6 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6 | scsi: megasas: null terminate bios version buffer
While reading information via 'megasas_ctrl_get_info' routine,
a local bios version buffer isn't null terminated. Add the
terminating null byte to avoid any OOB access.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Sig... | 1 | static int megasas_ctrl_get_info(MegasasState *s, MegasasCmd *cmd)
{
PCIDevice *pci_dev = PCI_DEVICE(s);
PCIDeviceClass *pci_class = PCI_DEVICE_GET_CLASS(pci_dev);
MegasasBaseClass *base_class = MEGASAS_DEVICE_GET_CLASS(s);
struct mfi_ctrl_info info;
size_t dcmd_size = sizeof(info);
BusChild *ki... | 340,248,343,264,835,060,000,000,000,000,000,000,000 | megasas.c | 35,182,564,994,204,110,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2016-5337 | The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information. | https://nvd.nist.gov/vuln/detail/CVE-2016-5337 |
194,690 | qemu | 844864fbae66935951529408831c2f22367a57b6 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6 | scsi: megasas: null terminate bios version buffer
While reading information via 'megasas_ctrl_get_info' routine,
a local bios version buffer isn't null terminated. Add the
terminating null byte to avoid any OOB access.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Sig... | 0 | static int megasas_ctrl_get_info(MegasasState *s, MegasasCmd *cmd)
{
PCIDevice *pci_dev = PCI_DEVICE(s);
PCIDeviceClass *pci_class = PCI_DEVICE_GET_CLASS(pci_dev);
MegasasBaseClass *base_class = MEGASAS_DEVICE_GET_CLASS(s);
struct mfi_ctrl_info info;
size_t dcmd_size = sizeof(info);
BusChild *ki... | 262,999,860,477,650,460,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-5337 | The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information. | https://nvd.nist.gov/vuln/detail/CVE-2016-5337 |
10,720 | FFmpeg | c24bcb553650b91e9eff15ef6e54ca73de2453b7 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c24bcb553650b91e9eff15ef6e54ca73de2453b7 | avformat/nsvdec: Fix DoS due to lack of eof check in nsvs_file_offset loop.
Fixes: 20170829.nsv
Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com>
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int nsv_parse_NSVf_header(AVFormatContext *s)
{
NSVContext *nsv = s->priv_data;
AVIOContext *pb = s->pb;
unsigned int av_unused file_size;
unsigned int size;
int64_t duration;
int strings_size;
int table_entries;
int table_entries_used;
nsv->state = NSV_UNSYNC; /* in case we ... | 56,714,162,752,573,535,000,000,000,000,000,000,000 | nsvdec.c | 37,860,070,422,108,427,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14171 | In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 't... | https://nvd.nist.gov/vuln/detail/CVE-2017-14171 |
159,937 | FFmpeg | c24bcb553650b91e9eff15ef6e54ca73de2453b7 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c24bcb553650b91e9eff15ef6e54ca73de2453b7 | avformat/nsvdec: Fix DoS due to lack of eof check in nsvs_file_offset loop.
Fixes: 20170829.nsv
Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com>
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int nsv_parse_NSVf_header(AVFormatContext *s)
{
NSVContext *nsv = s->priv_data;
AVIOContext *pb = s->pb;
unsigned int av_unused file_size;
unsigned int size;
int64_t duration;
int strings_size;
int table_entries;
int table_entries_used;
nsv->state = NSV_UNSYNC; /* in case we ... | 233,221,989,185,080,140,000,000,000,000,000,000,000 | None | null | [
"CWE-834"
] | CVE-2017-14171 | In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 't... | https://nvd.nist.gov/vuln/detail/CVE-2017-14171 |
10,721 | php-src | 8d2539fa0faf3f63e1d1e7635347c5b9e777d47b | https://github.com/php/php-src | https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b | Fix bug #73831 - NULL Pointer Dereference while unserialize php object | 1 | */
static void php_wddx_pop_element(void *user_data, const XML_Char *name)
{
st_entry *ent1, *ent2;
wddx_stack *stack = (wddx_stack *)user_data;
HashTable *target_hash;
zend_class_entry *pce;
zval obj;
/* OBJECTS_FIXME */
if (stack->top == 0) {
return;
}
if (!strcmp((char *)name, EL_STRING) ||... | 51,441,026,749,032,170,000,000,000,000,000,000,000 | wddx.c | 147,391,937,390,179,960,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10162 | The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10162 |
160,453 | php-src | 8d2539fa0faf3f63e1d1e7635347c5b9e777d47b | https://github.com/php/php-src | https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b | Fix bug #73831 - NULL Pointer Dereference while unserialize php object | 0 | static void php_wddx_pop_element(void *user_data, const XML_Char *name)
{
st_entry *ent1, *ent2;
wddx_stack *stack = (wddx_stack *)user_data;
HashTable *target_hash;
zend_class_entry *pce;
zval obj;
/* OBJECTS_FIXME */
if (stack->top == 0) {
return;
}
if (!strcmp((char *)name, EL_STRING) || !st... | 174,047,551,012,994,900,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2016-10162 | The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10162 |
10,723 | libx11 | b469da1430cdcee06e31c6251b83aede072a1ff0 | https://gitlab.freedesktop.org/xorg/lib/libx11 | https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0 | Fixed off-by-one writes (CVE-2018-14599).
The functions XGetFontPath, XListExtensions, and XListFonts are
vulnerable to an off-by-one override on malicious server responses.
The server replies consist of chunks consisting of a length byte
followed by actual string, which is not NUL-terminated.
While parsing the resp... | 1 | char **XListExtensions(
register Display *dpy,
int *nextensions) /* RETURN */
{
xListExtensionsReply rep;
char **list = NULL;
char *ch = NULL;
char *chend;
int count = 0;
register unsigned i;
register int length;
_X_UNUSED register xReq *req;
unsigned long rlen = 0;
LockDisplay(dpy);
GetEmptyReq (Li... | 163,033,534,115,641,510,000,000,000,000,000,000,000 | ListExt.c | 320,148,940,157,906,520,000,000,000,000,000,000,000 | [
"CWE-682"
] | CVE-2018-14599 | An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-14599 |
194,613 | libx11 | b469da1430cdcee06e31c6251b83aede072a1ff0 | https://gitlab.freedesktop.org/xorg/lib/libx11 | https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0 | Fixed off-by-one writes (CVE-2018-14599).
The functions XGetFontPath, XListExtensions, and XListFonts are
vulnerable to an off-by-one override on malicious server responses.
The server replies consist of chunks consisting of a length byte
followed by actual string, which is not NUL-terminated.
While parsing the resp... | 0 | char **XListExtensions(
register Display *dpy,
int *nextensions) /* RETURN */
{
xListExtensionsReply rep;
char **list = NULL;
char *ch = NULL;
char *chend;
int count = 0;
register unsigned i;
register int length;
_X_UNUSED register xReq *req;
unsigned long rlen = 0;
LockDisplay(dpy);
GetEmptyReq (Li... | 197,201,854,500,169,240,000,000,000,000,000,000,000 | None | null | [
"CWE-682"
] | CVE-2018-14599 | An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-14599 |
10,726 | php-src | 35ceea928b12373a3b1e3eecdc32ed323223a40d | https://github.com/php/php-src | https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d | Fix bug #67060: use default mode of 660 | 1 | int fpm_unix_resolve_socket_premissions(struct fpm_worker_pool_s *wp) /* {{{ */
{
struct fpm_worker_pool_config_s *c = wp->config;
/* uninitialized */
wp->socket_uid = -1;
wp->socket_gid = -1;
wp->socket_mode = 0666;
if (!c) {
return 0;
}
if (c->listen_owner && *c->listen_owner) {
struct passwd *pwd;
... | 91,364,791,922,883,400,000,000,000,000,000,000,000 | fpm_unix.c | 34,662,802,751,318,727,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0185 | sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client. | https://nvd.nist.gov/vuln/detail/CVE-2014-0185 |
159,071 | php-src | 35ceea928b12373a3b1e3eecdc32ed323223a40d | https://github.com/php/php-src | https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d | Fix bug #67060: use default mode of 660 | 0 | int fpm_unix_resolve_socket_premissions(struct fpm_worker_pool_s *wp) /* {{{ */
{
struct fpm_worker_pool_config_s *c = wp->config;
/* uninitialized */
wp->socket_uid = -1;
wp->socket_gid = -1;
wp->socket_mode = 0660;
if (!c) {
return 0;
}
if (c->listen_owner && *c->listen_owner) {
struct passwd *pw... | 132,215,415,946,904,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2014-0185 | sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client. | https://nvd.nist.gov/vuln/detail/CVE-2014-0185 |
10,727 | WavPack | 33a0025d1d63ccd05d9dbaa6923d52b1446a62fe | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe | issue #68: clear WaveHeader at start to prevent uninitialized read | 1 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
int format_chunk = 0;
uint32_t bcount;
infilesize ... | 277,131,272,340,638,830,000,000,000,000,000,000,000 | wave64.c | 277,994,324,779,500,450,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-1010319 | WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavP... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010319 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.