idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
332,426
ImageMagick
986b5dff173413fa712db27eb677cdef15f0bab6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/986b5dff173413fa712db27eb677cdef15f0bab6
https://github.com/ImageMagick/ImageMagick/issues/1748
0
static void TIFFGetProfiles(TIFF *tiff,Image *image,ExceptionInfo *exception) { uint32 length; unsigned char *profile; length=0; #if defined(TIFFTAG_ICCPROFILE) if ((TIFFGetField(tiff,TIFFTAG_ICCPROFILE,&length,&profile) == 1) && (profile != (unsigned char *) NULL)) (void) ReadProfile(image,...
288,915,792,061,345,400,000,000,000,000,000,000,000
tiff.c
119,020,272,324,364,410,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-25667
TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. Th...
https://nvd.nist.gov/vuln/detail/CVE-2020-25667
202,284
ImageMagick
ec9c8944af2bfc65c697ca44f93a727a99b405f1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ec9c8944af2bfc65c697ca44f93a727a99b405f1
[FG-VD-19-136] ImageMagick Convert SVG MacOS Denial Of Service
1
static Image *ReadSVGImage(const ImageInfo *image_info,ExceptionInfo *exception) { char filename[MagickPathExtent]; FILE *file; Image *image, *next; int status, unique_file; ssize_t n; SVGInfo *svg_info; unsigned char message[MagickPathExtent]; xmlSAXHandler ...
144,759,316,345,644,960,000,000,000,000,000,000,000
svg.c
31,367,518,227,867,702,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18853
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
https://nvd.nist.gov/vuln/detail/CVE-2019-18853
332,511
ImageMagick
ec9c8944af2bfc65c697ca44f93a727a99b405f1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ec9c8944af2bfc65c697ca44f93a727a99b405f1
[FG-VD-19-136] ImageMagick Convert SVG MacOS Denial Of Service
0
static Image *ReadSVGImage(const ImageInfo *image_info,ExceptionInfo *exception) { char filename[MagickPathExtent]; FILE *file; Image *image, *next; int status, unique_file; ssize_t n; SVGInfo *svg_info; unsigned char message[MagickPathExtent]; xmlSAXHandler ...
181,206,223,454,476,360,000,000,000,000,000,000,000
svg.c
207,488,516,249,466,650,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18853
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
https://nvd.nist.gov/vuln/detail/CVE-2019-18853
202,285
LibRaw
d7c3d2cb460be10a3ea7b32e9443a83c243b2251
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251
Secunia SA75000 advisory: several buffer overruns
1
int CLASS parse_tiff_ifd(int base) { unsigned entries, tag, type, len, plen = 16, save; int ifd, use_cm = 0, cfa, i, j, c, ima_len = 0; char *cbuf, *cp; uchar cfa_pat[16], cfa_pc[] = {0, 1, 2, 3}, tab[256]; double fm[3][4], cc[4][4], cm[4][3], cam_xyz[4][3], num; double ab[] = {1, 1, 1, 1}, asn[] = {0, 0, 0...
118,968,640,676,209,570,000,000,000,000,000,000,000
dcraw.c
284,434,708,767,368,270,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6887
A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs.
https://nvd.nist.gov/vuln/detail/CVE-2017-6887
332,541
LibRaw
d7c3d2cb460be10a3ea7b32e9443a83c243b2251
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251
Secunia SA75000 advisory: several buffer overruns
0
int CLASS parse_tiff_ifd(int base) { unsigned entries, tag, type, len, plen = 16, save; int ifd, use_cm = 0, cfa, i, j, c, ima_len = 0; char *cbuf, *cp; uchar cfa_pat[16], cfa_pc[] = {0, 1, 2, 3}, tab[256]; double fm[3][4], cc[4][4], cm[4][3], cam_xyz[4][3], num; double ab[] = {1, 1, 1, 1}, asn[] = {0, 0, 0...
39,648,393,938,825,720,000,000,000,000,000,000,000
dcraw.c
285,367,537,398,910,200,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6887
A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs.
https://nvd.nist.gov/vuln/detail/CVE-2017-6887
202,293
gsasl
796e4197f696261c1f872d7576371232330bcc30
https://gitlab.com/gsasl/gsasl
https://gitlab.com/gsasl/gsasl/-/commit/796e4197f696261c1f872d7576371232330bcc30
GSSAPI server: Boundary check gss_wrap token (read OOB).
1
_gsasl_gssapi_server_step (Gsasl_session * sctx, void *mech_data, const char *input, size_t input_len, char **output, size_t *output_len) { _Gsasl_gssapi_server_state *state = mech_data; gss_buffer_desc bufdesc1, bufdesc2; OM_uint32 maj_stat, min_stat; gss_buffer_desc client_name; gss_OID me...
115,734,198,567,060,880,000,000,000,000,000,000,000
server.c
161,394,644,553,251,140,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-2469
GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client
https://nvd.nist.gov/vuln/detail/CVE-2022-2469
332,612
gsasl
796e4197f696261c1f872d7576371232330bcc30
https://gitlab.com/gsasl/gsasl
https://gitlab.com/gsasl/gsasl/-/commit/796e4197f696261c1f872d7576371232330bcc30
GSSAPI server: Boundary check gss_wrap token (read OOB).
0
_gsasl_gssapi_server_step (Gsasl_session * sctx, void *mech_data, const char *input, size_t input_len, char **output, size_t *output_len) { _Gsasl_gssapi_server_state *state = mech_data; gss_buffer_desc bufdesc1, bufdesc2; OM_uint32 maj_stat, min_stat; gss_buffer_desc client_name; gss_OID me...
214,326,085,585,339,450,000,000,000,000,000,000,000
server.c
19,690,466,273,325,705,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-2469
GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client
https://nvd.nist.gov/vuln/detail/CVE-2022-2469
202,393
linux
128c66429247add5128c03dc1e144ca56f05a4e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
crypto: ccp - Release all allocated memory if sha type is invalid Release all allocated memory if sha type is invalid: In ccp_run_sha_cmd, if the type of sha is invalid, the allocated hmac_buf should be released. v2: fix the goto. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Acked-by: Gary R Hook <gary...
1
ccp_run_sha_cmd(struct ccp_cmd_queue *cmd_q, struct ccp_cmd *cmd) { struct ccp_sha_engine *sha = &cmd->u.sha; struct ccp_dm_workarea ctx; struct ccp_data src; struct ccp_op op; unsigned int ioffset, ooffset; unsigned int digest_size; int sb_count; const void *init; u64 block_size; int ctx_size; int ret; sw...
50,090,079,932,274,030,000,000,000,000,000,000,000
ccp-ops.c
10,822,245,767,038,662,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18808
A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
https://nvd.nist.gov/vuln/detail/CVE-2019-18808
333,561
linux
128c66429247add5128c03dc1e144ca56f05a4e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
crypto: ccp - Release all allocated memory if sha type is invalid Release all allocated memory if sha type is invalid: In ccp_run_sha_cmd, if the type of sha is invalid, the allocated hmac_buf should be released. v2: fix the goto. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Acked-by: Gary R Hook <gary...
0
ccp_run_sha_cmd(struct ccp_cmd_queue *cmd_q, struct ccp_cmd *cmd) { struct ccp_sha_engine *sha = &cmd->u.sha; struct ccp_dm_workarea ctx; struct ccp_data src; struct ccp_op op; unsigned int ioffset, ooffset; unsigned int digest_size; int sb_count; const void *init; u64 block_size; int ctx_size; int ret; sw...
321,672,982,073,349,330,000,000,000,000,000,000,000
ccp-ops.c
159,542,505,151,090,120,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18808
A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
https://nvd.nist.gov/vuln/detail/CVE-2019-18808
202,395
gst-plugins-bad
11353b3f6e2f047cc37483d21e6a37ae558896bc
https://github.com/GStreamer/gst-plugins-bad
https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/commit/11353b3f6e2f047cc37483d21e6a37ae558896bc
codecparsers: h264parser: guard against ref_pic_markings overflow Part-of: <https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/merge_requests/1703>
1
gst_h264_slice_parse_dec_ref_pic_marking (GstH264SliceHdr * slice, GstH264NalUnit * nalu, NalReader * nr) { GstH264DecRefPicMarking *dec_ref_pic_m; guint start_pos; GST_DEBUG ("parsing \"Decoded reference picture marking\""); start_pos = nal_reader_get_pos (nr); dec_ref_pic_m = &slice->dec_ref_pic_mark...
221,181,476,304,749,900,000,000,000,000,000,000,000
gsth264parser.c
329,037,044,820,659,200,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-3185
A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution.
https://nvd.nist.gov/vuln/detail/CVE-2021-3185
333,608
gst-plugins-bad
11353b3f6e2f047cc37483d21e6a37ae558896bc
https://github.com/GStreamer/gst-plugins-bad
https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/commit/11353b3f6e2f047cc37483d21e6a37ae558896bc
codecparsers: h264parser: guard against ref_pic_markings overflow Part-of: <https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/merge_requests/1703>
0
gst_h264_slice_parse_dec_ref_pic_marking (GstH264SliceHdr * slice, GstH264NalUnit * nalu, NalReader * nr) { GstH264DecRefPicMarking *dec_ref_pic_m; guint start_pos; GST_DEBUG ("parsing \"Decoded reference picture marking\""); start_pos = nal_reader_get_pos (nr); dec_ref_pic_m = &slice->dec_ref_pic_mark...
152,728,298,469,239,240,000,000,000,000,000,000,000
gsth264parser.c
96,061,780,272,416,210,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-3185
A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution.
https://nvd.nist.gov/vuln/detail/CVE-2021-3185
202,559
php-src
a33759fd275b32ed0bbe89796fe2953b3cb0b41f
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=a33759fd275b32ed0bbe89796fe2953b3cb0b41f
Fixed Bug #66820 out-of-bounds memory access in fileinfo Upstream fix: https://github.com/glensc/file/commit/447558595a3650db2886cd2f416ad0beba965801 Notice, test changed, with upstream agreement: -define OFFSET_OOB(n, o, i) ((n) < (o) || (i) >= ((n) - (o))) +define OFFSET_OOB(n, o, i) ((n) < (o) || (i) > ((n) - (o)...
1
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, int recursion_level, int *printed_something, int *need_separator, int *returnval) { uint32_t soffset, offset = ms->offset; uint32_t count = m->st...
23,594,315,334,891,064,000,000,000,000,000,000,000
softmagic.c
248,603,902,273,269,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2270
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
https://nvd.nist.gov/vuln/detail/CVE-2014-2270
334,528
php-src
a33759fd275b32ed0bbe89796fe2953b3cb0b41f
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=a33759fd275b32ed0bbe89796fe2953b3cb0b41f
Fixed Bug #66820 out-of-bounds memory access in fileinfo Upstream fix: https://github.com/glensc/file/commit/447558595a3650db2886cd2f416ad0beba965801 Notice, test changed, with upstream agreement: -define OFFSET_OOB(n, o, i) ((n) < (o) || (i) >= ((n) - (o))) +define OFFSET_OOB(n, o, i) ((n) < (o) || (i) > ((n) - (o)...
0
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, int recursion_level, int *printed_something, int *need_separator, int *returnval) { uint32_t soffset, offset = ms->offset; uint32_t count = m->st...
331,182,048,060,659,100,000,000,000,000,000,000,000
softmagic.c
238,093,449,838,880,020,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2270
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
https://nvd.nist.gov/vuln/detail/CVE-2014-2270
202,564
linux
f5449e74802c1112dea984aec8af7a33c4516af1
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy ucma_destroy_id() assumes that all things accessing the ctx will do so via the xarray. This assumption violated only in the case the FD is being closed, then the ctx is reached via the ctx_list. Normally this is OK since ucma_destroy_id() cannot run concu...
1
static ssize_t ucma_migrate_id(struct ucma_file *new_file, const char __user *inbuf, int in_len, int out_len) { struct rdma_ucm_migrate_id cmd; struct rdma_ucm_migrate_resp resp; struct ucma_context *ctx; struct fd f; struct ucma_file *cur_file; int ret = 0; if (copy_from_user(&cmd, inbuf, s...
38,772,179,023,536,740,000,000,000,000,000,000,000
ucma.c
260,728,566,417,634,200,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-36385
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
https://nvd.nist.gov/vuln/detail/CVE-2020-36385
334,589
linux
f5449e74802c1112dea984aec8af7a33c4516af1
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy ucma_destroy_id() assumes that all things accessing the ctx will do so via the xarray. This assumption violated only in the case the FD is being closed, then the ctx is reached via the ctx_list. Normally this is OK since ucma_destroy_id() cannot run concu...
0
static ssize_t ucma_migrate_id(struct ucma_file *new_file, const char __user *inbuf, int in_len, int out_len) { struct rdma_ucm_migrate_id cmd; struct rdma_ucm_migrate_resp resp; struct ucma_event *uevent, *tmp; struct ucma_context *ctx; LIST_HEAD(event_list); struct fd f; struct ucma_file *c...
88,339,149,708,390,080,000,000,000,000,000,000,000
ucma.c
19,789,728,225,973,280,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-36385
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
https://nvd.nist.gov/vuln/detail/CVE-2020-36385
202,577
rsync
47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1
https://github.com/WayneD/rsync
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1
Enforce trailing \0 when receiving xattr name values. Fixes bug 13112.
1
void receive_xattr(int f, struct file_struct *file) { static item_list temp_xattr = EMPTY_ITEM_LIST; int count, num; #ifdef HAVE_LINUX_XATTRS int need_sort = 0; #else int need_sort = 1; #endif int ndx = read_varint(f); if (ndx < 0 || (size_t)ndx > rsync_xal_l.count) { rprintf(FERROR, "receive_xattr: xa index %...
243,623,024,391,574,070,000,000,000,000,000,000,000
xattrs.c
217,588,258,695,223,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16548
The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to t...
https://nvd.nist.gov/vuln/detail/CVE-2017-16548
335,138
rsync
47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1
https://github.com/WayneD/rsync
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1
Enforce trailing \0 when receiving xattr name values. Fixes bug 13112.
0
void receive_xattr(int f, struct file_struct *file) { static item_list temp_xattr = EMPTY_ITEM_LIST; int count, num; #ifdef HAVE_LINUX_XATTRS int need_sort = 0; #else int need_sort = 1; #endif int ndx = read_varint(f); if (ndx < 0 || (size_t)ndx > rsync_xal_l.count) { rprintf(FERROR, "receive_xattr: xa index %...
255,134,904,863,333,060,000,000,000,000,000,000,000
xattrs.c
327,517,846,050,383,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16548
The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to t...
https://nvd.nist.gov/vuln/detail/CVE-2017-16548
202,585
radare2
a5aafb99c3965259c84ddcf45a91144bf7eb4cf1
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1
Fix null deref in macho parser ##crash * Reported by Han0nly via huntrdev * BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449 * Reproducer: machonull
1
void MACH0_(iterate_chained_fixups)(struct MACH0_(obj_t) *bin, ut64 limit_start, ut64 limit_end, ut32 event_mask, RFixupCallback callback, void * context) { int i = 0; for (; i < bin->nsegs && i < bin->segs_count; i++) { if (!bin->chained_starts[i]) { continue; } int page_size = bin->chained_starts[i]->page_...
193,240,874,041,910,470,000,000,000,000,000,000,000
mach0.c
192,907,863,915,294,270,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-1649
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).
https://nvd.nist.gov/vuln/detail/CVE-2022-1649
335,239
radare2
a5aafb99c3965259c84ddcf45a91144bf7eb4cf1
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1
Fix null deref in macho parser ##crash * Reported by Han0nly via huntrdev * BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449 * Reproducer: machonull
0
void MACH0_(iterate_chained_fixups)(struct MACH0_(obj_t) *bin, ut64 limit_start, ut64 limit_end, ut32 event_mask, RFixupCallback callback, void * context) { int i = 0; for (; i < bin->nsegs && i < bin->segs_count; i++) { if (!bin->chained_starts[i]) { continue; } int page_size = bin->chained_starts[i]->page_...
271,044,673,647,208,800,000,000,000,000,000,000,000
mach0.c
256,621,041,784,698,250,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-1649
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).
https://nvd.nist.gov/vuln/detail/CVE-2022-1649
202,606
gnutls
15beb4b193b2714d88107e7dffca781798684e7e
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/-/commit/15beb4b193b2714d88107e7dffca781798684e7e
key_share: avoid use-after-free around realloc Signed-off-by: Daiki Ueno <ueno@gnu.org>
1
key_share_send_params(gnutls_session_t session, gnutls_buffer_st * extdata) { unsigned i; int ret; unsigned char *lengthp; unsigned int cur_length; unsigned int generated = 0; const gnutls_group_entry_st *group; const version_entry_st *ver; /* this extension is only being sent on client side */ if (se...
49,209,943,683,478,870,000,000,000,000,000,000,000
key_share.c
85,745,036,328,654,640,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-20231
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
https://nvd.nist.gov/vuln/detail/CVE-2021-20231
335,473
gnutls
15beb4b193b2714d88107e7dffca781798684e7e
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/-/commit/15beb4b193b2714d88107e7dffca781798684e7e
key_share: avoid use-after-free around realloc Signed-off-by: Daiki Ueno <ueno@gnu.org>
0
key_share_send_params(gnutls_session_t session, gnutls_buffer_st * extdata) { unsigned i; int ret; unsigned int generated = 0; const gnutls_group_entry_st *group; const version_entry_st *ver; /* this extension is only being sent on client side */ if (session->security_parameters.entity == GNUTLS_CLIENT)...
273,562,830,079,185,900,000,000,000,000,000,000,000
key_share.c
3,029,754,136,649,504,500,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-20231
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
https://nvd.nist.gov/vuln/detail/CVE-2021-20231
202,607
ImageMagick6
9c31c956a1b2d65d0be0636d2eab3cd787897d35
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/9c31c956a1b2d65d0be0636d2eab3cd787897d35
https://github.com/ImageMagick/ImageMagick/issues/664
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
221,284,412,906,942,740,000,000,000,000,000,000,000
tiff.c
37,480,667,358,246,354,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-12805
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-12805
335,480
ImageMagick6
9c31c956a1b2d65d0be0636d2eab3cd787897d35
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/9c31c956a1b2d65d0be0636d2eab3cd787897d35
https://github.com/ImageMagick/ImageMagick/issues/664
0
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
60,573,215,780,146,840,000,000,000,000,000,000,000
tiff.c
312,936,306,932,734,400,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-12805
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-12805
202,608
lldpd
a8d3c90feca548fc0656d95b5d278713db86ff61
https://github.com/vincentbernat/lldpd
https://github.com/lldpd/lldpd/commit/a8d3c90feca548fc0656d95b5d278713db86ff61
lldp: avoid memory leak from bad packets A packet that contains multiple instances of certain TLVs will cause lldpd to continually allocate memory and leak the old memory. As an example, multiple instances of system name TLV will cause old values to be dropped by the decoding routine. Reported-at: https://github.com...
1
lldp_decode(struct lldpd *cfg, char *frame, int s, struct lldpd_hardware *hardware, struct lldpd_chassis **newchassis, struct lldpd_port **newport) { struct lldpd_chassis *chassis; struct lldpd_port *port; char lldpaddr[ETHER_ADDR_LEN]; const char dot1[] = LLDP_TLV_ORG_DOT1; const char dot3[] = LLDP_TLV_OR...
334,246,557,583,225,300,000,000,000,000,000,000,000
lldp.c
338,594,752,845,422,840,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2020-27827
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-27827
335,494
lldpd
a8d3c90feca548fc0656d95b5d278713db86ff61
https://github.com/vincentbernat/lldpd
https://github.com/lldpd/lldpd/commit/a8d3c90feca548fc0656d95b5d278713db86ff61
lldp: avoid memory leak from bad packets A packet that contains multiple instances of certain TLVs will cause lldpd to continually allocate memory and leak the old memory. As an example, multiple instances of system name TLV will cause old values to be dropped by the decoding routine. Reported-at: https://github.com...
0
lldp_decode(struct lldpd *cfg, char *frame, int s, struct lldpd_hardware *hardware, struct lldpd_chassis **newchassis, struct lldpd_port **newport) { struct lldpd_chassis *chassis; struct lldpd_port *port; char lldpaddr[ETHER_ADDR_LEN]; const char dot1[] = LLDP_TLV_ORG_DOT1; const char dot3[] = LLDP_TLV_OR...
5,466,741,183,457,960,000,000,000,000,000,000,000
lldp.c
223,793,138,512,356,470,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2020-27827
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-27827
202,617
yajl-ruby
a8ca8f476655adaa187eedc60bdc770fff3c51ce
https://github.com/brianmario/yajl-ruby
https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce
Don't advance our end pointer until we've checked we have enough buffer left and have peeked ahead to see that a unicode escape is approaching. Thanks @kivikakk for helping me track down the actual bug here!
1
void yajl_string_decode(yajl_buf buf, const unsigned char * str, unsigned int len) { unsigned int beg = 0; unsigned int end = 0; while (end < len) { if (str[end] == '\\') { char utf8Buf[5]; const char * unescaped = "?"; yajl_buf_append...
181,307,126,597,938,260,000,000,000,000,000,000,000
yajl_encode.c
265,661,678,914,309,680,000,000,000,000,000,000,000
[ "CWE-134" ]
CVE-2017-16516
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-16516
335,518
yajl-ruby
a8ca8f476655adaa187eedc60bdc770fff3c51ce
https://github.com/brianmario/yajl-ruby
https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce
Don't advance our end pointer until we've checked we have enough buffer left and have peeked ahead to see that a unicode escape is approaching. Thanks @kivikakk for helping me track down the actual bug here!
0
void yajl_string_decode(yajl_buf buf, const unsigned char * str, unsigned int len) { unsigned int beg = 0; unsigned int end = 0; while (end < len) { if (str[end] == '\\') { char utf8Buf[5]; const char * unescaped = "?"; yajl_buf_append...
81,198,163,520,215,920,000,000,000,000,000,000,000
yajl_encode.c
197,486,582,965,095,000,000,000,000,000,000,000,000
[ "CWE-134" ]
CVE-2017-16516
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-16516
202,627
ruby
c7d7ff45f1e0d6fad28e53c02108d4b067e843c3
https://github.com/ruby/ruby
https://github.com/ruby/ruby/commit/c7d7ff45f1e0d6fad28e53c02108d4b067e843c3
* ext/dl/lib/dl/func.rb (DL::Function#call): check tainted when $SAFE > 0. * ext/fiddle/function.c (function_call): check tainted when $SAFE > 0. * test/fiddle/test_func.rb (module Fiddle): add test for above. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@40728 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
1
function_call(int argc, VALUE argv[], VALUE self) { ffi_cif * cif; fiddle_generic retval; fiddle_generic *generic_args; void **values; VALUE cfunc, types, cPointer; int i; cfunc = rb_iv_get(self, "@ptr"); types = rb_iv_get(self, "@args"); cPointer = rb_const_get(mFiddle, rb_in...
206,873,134,629,291,320,000,000,000,000,000,000,000
function.c
195,617,434,498,371,100,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-2065
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
https://nvd.nist.gov/vuln/detail/CVE-2013-2065
335,735
ruby
c7d7ff45f1e0d6fad28e53c02108d4b067e843c3
https://github.com/ruby/ruby
https://github.com/ruby/ruby/commit/c7d7ff45f1e0d6fad28e53c02108d4b067e843c3
* ext/dl/lib/dl/func.rb (DL::Function#call): check tainted when $SAFE > 0. * ext/fiddle/function.c (function_call): check tainted when $SAFE > 0. * test/fiddle/test_func.rb (module Fiddle): add test for above. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@40728 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
0
function_call(int argc, VALUE argv[], VALUE self) { ffi_cif * cif; fiddle_generic retval; fiddle_generic *generic_args; void **values; VALUE cfunc, types, cPointer; int i; cfunc = rb_iv_get(self, "@ptr"); types = rb_iv_get(self, "@args"); cPointer = rb_const_get(mFiddle, rb_in...
216,224,853,251,678,570,000,000,000,000,000,000,000
function.c
224,240,350,581,390,100,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-2065
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
https://nvd.nist.gov/vuln/detail/CVE-2013-2065
202,637
mumble
d3be3d7b96a5130e4b20f23e327b040ea4d0b079
https://github.com/mumble-voip/mumble
https://github.com/mumble-voip/mumble/commit/d3be3d7b96a5130e4b20f23e327b040ea4d0b079
mumble: fix Mumble-SA-2014-002 (CVE-2014-0045).
1
bool AudioOutputSpeech::needSamples(unsigned int snum) { for (unsigned int i=iLastConsume;i<iBufferFilled;++i) pfBuffer[i-iLastConsume]=pfBuffer[i]; iBufferFilled -= iLastConsume; iLastConsume = snum; if (iBufferFilled >= snum) return bLastAlive; float *pOut; bool nextalive = bLastAlive; while (iBufferFi...
215,357,927,557,034,220,000,000,000,000,000,000,000
AudioOutputSpeech.cpp
267,424,787,523,206,800,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-0045
The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to ca...
https://nvd.nist.gov/vuln/detail/CVE-2014-0045
335,782
mumble
d3be3d7b96a5130e4b20f23e327b040ea4d0b079
https://github.com/mumble-voip/mumble
https://github.com/mumble-voip/mumble/commit/d3be3d7b96a5130e4b20f23e327b040ea4d0b079
mumble: fix Mumble-SA-2014-002 (CVE-2014-0045).
0
bool AudioOutputSpeech::needSamples(unsigned int snum) { for (unsigned int i=iLastConsume;i<iBufferFilled;++i) pfBuffer[i-iLastConsume]=pfBuffer[i]; iBufferFilled -= iLastConsume; iLastConsume = snum; if (iBufferFilled >= snum) return bLastAlive; float *pOut; bool nextalive = bLastAlive; while (iBufferFi...
318,177,891,352,209,840,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-0045
The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to ca...
https://nvd.nist.gov/vuln/detail/CVE-2014-0045
202,639
xserver
7aaf54a1884f71dc363f0b884e57bcb67407a6cd
http://gitweb.freedesktop.org/?p=xorg/xserver
https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd
Fix XChangeFeedbackControl() request underflow CVE-2021-3472 / ZDI-CAN-1259 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
1
ProcXChangeFeedbackControl(ClientPtr client) { unsigned len; DeviceIntPtr dev; KbdFeedbackPtr k; PtrFeedbackPtr p; IntegerFeedbackPtr i; StringFeedbackPtr s; BellFeedbackPtr b; LedFeedbackPtr l; int rc; REQUEST(xChangeFeedbackControlReq); REQUEST_AT_LEAST_SIZE(xChangeFeedbac...
25,902,079,671,328,110,000,000,000,000,000,000,000
chgfctl.c
165,947,780,592,021,760,000,000,000,000,000,000,000
[ "CWE-191" ]
CVE-2021-3472
A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-3472
335,787
xserver
7aaf54a1884f71dc363f0b884e57bcb67407a6cd
http://gitweb.freedesktop.org/?p=xorg/xserver
https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd
Fix XChangeFeedbackControl() request underflow CVE-2021-3472 / ZDI-CAN-1259 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
0
ProcXChangeFeedbackControl(ClientPtr client) { unsigned len; DeviceIntPtr dev; KbdFeedbackPtr k; PtrFeedbackPtr p; IntegerFeedbackPtr i; StringFeedbackPtr s; BellFeedbackPtr b; LedFeedbackPtr l; int rc; REQUEST(xChangeFeedbackControlReq); REQUEST_AT_LEAST_SIZE(xChangeFeedbac...
303,637,264,499,287,500,000,000,000,000,000,000,000
chgfctl.c
197,769,370,898,863,100,000,000,000,000,000,000,000
[ "CWE-191" ]
CVE-2021-3472
A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-3472
202,648
qemu
b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef
https://github.com/bonzini/qemu
http://git.kernel.dk/?p=qemu.git;a=commitdiff;h=b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef
CVE-2007-1320 - Cirrus LGD-54XX "bitblt" heap overflow I have just noticed that patch for CVE-2007-1320 has never been applied to the QEMU CVS. Please find it below. | Multiple heap-based buffer overflows in the cirrus_invalidate_region | function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and | possib...
1
static void cirrus_invalidate_region(CirrusVGAState * s, int off_begin, int off_pitch, int bytesperline, int lines) { int y; int off_cur; int off_cur_end; for (y = 0; y < lines; y++) { off_cur = off_begin; off_cur_end = off_cur + bytesperline; off_cur &= TARGET_PAGE_MASK; while (o...
150,631,720,864,651,670,000,000,000,000,000,000,000
cirrus_vga.c
309,015,525,745,059,660,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2007-1320
Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" h...
https://nvd.nist.gov/vuln/detail/CVE-2007-1320
335,838
qemu
b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef
https://github.com/bonzini/qemu
http://git.kernel.dk/?p=qemu.git;a=commitdiff;h=b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef
CVE-2007-1320 - Cirrus LGD-54XX "bitblt" heap overflow I have just noticed that patch for CVE-2007-1320 has never been applied to the QEMU CVS. Please find it below. | Multiple heap-based buffer overflows in the cirrus_invalidate_region | function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and | possib...
0
static void cirrus_invalidate_region(CirrusVGAState * s, int off_begin, int off_pitch, int bytesperline, int lines) { int y; int off_cur; int off_cur_end; for (y = 0; y < lines; y++) { off_cur = off_begin; off_cur_end = (off_cur + bytesperline) & s->cirrus_addr_mask; off_cur &= TAR...
203,752,949,771,965,140,000,000,000,000,000,000,000
cirrus_vga.c
127,568,660,777,291,270,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2007-1320
Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" h...
https://nvd.nist.gov/vuln/detail/CVE-2007-1320
202,650
ImageMagick
df8a62fe4938aa41a39e815937c58bc0ed21b664
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/df8a62fe4938aa41a39e815937c58bc0ed21b664
https://github.com/ImageMagick/ImageMagick/issues/1049
1
static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType offset, *page_table, scene; MemoryInfo *pixel_info; PCXInfo pcx_info; register const Quantum *p; register ssize_t i, ...
26,887,853,232,422,637,000,000,000,000,000,000,000
pcx.c
231,868,396,343,821,160,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-18016
ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-18016
335,872
ImageMagick
df8a62fe4938aa41a39e815937c58bc0ed21b664
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/df8a62fe4938aa41a39e815937c58bc0ed21b664
https://github.com/ImageMagick/ImageMagick/issues/1049
0
static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType offset, *page_table, scene; MemoryInfo *pixel_info; PCXInfo pcx_info; register const Quantum *p; register ssize_t i, ...
66,243,249,277,711,320,000,000,000,000,000,000,000
pcx.c
232,415,578,718,635,000,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-18016
ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-18016
202,658
vim
e2fa213cf571041dbd04ab0329303ffdc980678a
https://github.com/vim/vim
https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a
patch 8.2.5024: using freed memory with "]d" Problem: Using freed memory with "]d". Solution: Copy the pattern before searching.
1
nv_brackets(cmdarg_T *cap) { pos_T prev_pos; pos_T *pos = NULL; // init for GCC pos_T old_pos; // cursor position before command int flag; long n; cap->oap->motion_type = MCHAR; cap->oap->inclusive = FALSE; old_pos = curwin->w_cursor; curwin->w_cursor.coladd = 0; // TODO...
311,492,303,638,563,900,000,000,000,000,000,000,000
normal.c
252,143,987,252,526,200,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-1898
Use After Free in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-1898
336,105
vim
e2fa213cf571041dbd04ab0329303ffdc980678a
https://github.com/vim/vim
https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a
patch 8.2.5024: using freed memory with "]d" Problem: Using freed memory with "]d". Solution: Copy the pattern before searching.
0
nv_brackets(cmdarg_T *cap) { pos_T prev_pos; pos_T *pos = NULL; // init for GCC pos_T old_pos; // cursor position before command int flag; long n; cap->oap->motion_type = MCHAR; cap->oap->inclusive = FALSE; old_pos = curwin->w_cursor; curwin->w_cursor.coladd = 0; // TODO...
117,058,894,084,913,720,000,000,000,000,000,000,000
normal.c
69,342,701,404,952,160,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-1898
Use After Free in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-1898
202,664
php-src
c6e34d91b88638966662caac62c4d0e90538e317
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=c6e34d91b88638966662caac62c4d0e90538e317
Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
1
compile_string_node(Node* node, regex_t* reg) { int r, len, prev_len, slen, ambig; OnigEncoding enc = reg->enc; UChar *p, *prev, *end; StrNode* sn; sn = NSTR(node); if (sn->end <= sn->s) return 0; end = sn->end; ambig = NSTRING_IS_AMBIG(node); p = prev = sn->s; prev_len = enclen(enc, p); p ...
286,601,417,110,115,650,000,000,000,000,000,000,000
regcomp.c
334,478,564,955,981,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9023
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/on...
https://nvd.nist.gov/vuln/detail/CVE-2019-9023
336,218
php-src
c6e34d91b88638966662caac62c4d0e90538e317
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=c6e34d91b88638966662caac62c4d0e90538e317
Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
0
compile_string_node(Node* node, regex_t* reg) { int r, len, prev_len, slen, ambig; OnigEncoding enc = reg->enc; UChar *p, *prev, *end; StrNode* sn; sn = NSTR(node); if (sn->end <= sn->s) return 0; end = sn->end; ambig = NSTRING_IS_AMBIG(node); p = prev = sn->s; prev_len = enclen(enc, p); p ...
83,994,044,431,215,480,000,000,000,000,000,000,000
regcomp.c
324,322,720,593,171,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9023
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/on...
https://nvd.nist.gov/vuln/detail/CVE-2019-9023
202,666
passenger
ddb8ecc4ebf260e4967f57f271d4f5761abeac3e
https://github.com/phusion/passenger
https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e
Fix CVE-2015-7519 header collision vulnerability
1
Controller::constructHeaderForSessionProtocol(Request *req, char * restrict buffer, unsigned int &size, const SessionProtocolWorkingState &state, string delta_monotonic) { char *pos = buffer; const char *end = buffer + size; pos += sizeof(boost::uint32_t); pos = appendData(pos, end, P_STATIC_STRING_WITH_NULL("RE...
237,090,291,769,915,940,000,000,000,000,000,000,000
SendRequest.cpp
201,534,075,635,135,300,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-7519
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in ...
https://nvd.nist.gov/vuln/detail/CVE-2015-7519
336,311
passenger
ddb8ecc4ebf260e4967f57f271d4f5761abeac3e
https://github.com/phusion/passenger
https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e
Fix CVE-2015-7519 header collision vulnerability
0
Controller::constructHeaderForSessionProtocol(Request *req, char * restrict buffer, unsigned int &size, const SessionProtocolWorkingState &state, string delta_monotonic) { char *pos = buffer; const char *end = buffer + size; pos += sizeof(boost::uint32_t); pos = appendData(pos, end, P_STATIC_STRING_WITH_NULL("RE...
60,838,788,408,756,440,000,000,000,000,000,000,000
SendRequest.cpp
59,962,529,913,623,890,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-7519
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in ...
https://nvd.nist.gov/vuln/detail/CVE-2015-7519
202,667
ImageMagick
7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9
https://github.com/ImageMagick/ImageMagick/issues/873
1
static Image *ReadXPMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char *grey, key[MagickPathExtent], target[MagickPathExtent], *xpm_buffer; Image *image; MagickBooleanType active, status; register char *next, *p, *q; register ssize_t x; regis...
326,559,310,483,777,100,000,000,000,000,000,000,000
xpm.c
180,884,855,428,845,170,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17680
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17680
336,319
ImageMagick
7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9
https://github.com/ImageMagick/ImageMagick/issues/873
0
static Image *ReadXPMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char *grey, key[MagickPathExtent], target[MagickPathExtent], *xpm_buffer; Image *image; MagickBooleanType active, status; register char *next, *p, *q; register ssize_t x; regis...
49,702,364,745,596,370,000,000,000,000,000,000,000
xpm.c
326,748,241,143,491,070,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17680
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17680
202,668
FreeRDP
6b2bc41935e53b0034fe5948aeeab4f32e80f30f
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f
Fix #6010: Check length in read_icon_info
1
static BOOL update_read_icon_info(wStream* s, ICON_INFO* iconInfo) { BYTE* newBitMask; if (Stream_GetRemainingLength(s) < 8) return FALSE; Stream_Read_UINT16(s, iconInfo->cacheEntry); /* cacheEntry (2 bytes) */ Stream_Read_UINT8(s, iconInfo->cacheId); /* cacheId (1 byte) */ Stream_Read_UINT8(s, iconInfo->b...
170,890,245,154,938,950,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2020-11042
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2...
https://nvd.nist.gov/vuln/detail/CVE-2020-11042
336,323
FreeRDP
6b2bc41935e53b0034fe5948aeeab4f32e80f30f
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f
Fix #6010: Check length in read_icon_info
0
static BOOL update_read_icon_info(wStream* s, ICON_INFO* iconInfo) { BYTE* newBitMask; if (Stream_GetRemainingLength(s) < 8) return FALSE; Stream_Read_UINT16(s, iconInfo->cacheEntry); /* cacheEntry (2 bytes) */ Stream_Read_UINT8(s, iconInfo->cacheId); /* cacheId (1 byte) */ Stream_Read_UINT8(s, iconInfo->b...
305,299,603,255,605,330,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2020-11042
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2...
https://nvd.nist.gov/vuln/detail/CVE-2020-11042
202,669
squid
983c5c36e5f109512ed1af38a329d0b5d0967498
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/983c5c36e5f109512ed1af38a329d0b5d0967498
Fix memory leak when parsing SNMP packet (#313) SNMP queries denied by snmp_access rules and queries with certain unsupported SNMPv2 commands were leaking a few hundred bytes each. Such queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log.
1
snmpDecodePacket(SnmpRequest * rq) { struct snmp_pdu *PDU; u_char *Community; u_char *buf = rq->buf; int len = rq->len; if (!Config.accessList.snmp) { debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from); return; } debugs(...
295,158,858,104,753,130,000,000,000,000,000,000,000
snmp_core.cc
213,619,074,999,419,820,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-19132
Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.
https://nvd.nist.gov/vuln/detail/CVE-2018-19132
336,342
squid
983c5c36e5f109512ed1af38a329d0b5d0967498
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/983c5c36e5f109512ed1af38a329d0b5d0967498
Fix memory leak when parsing SNMP packet (#313) SNMP queries denied by snmp_access rules and queries with certain unsupported SNMPv2 commands were leaking a few hundred bytes each. Such queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log.
0
snmpDecodePacket(SnmpRequest * rq) { struct snmp_pdu *PDU; u_char *Community; u_char *buf = rq->buf; int len = rq->len; if (!Config.accessList.snmp) { debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from); return; } debugs(...
124,468,677,242,160,090,000,000,000,000,000,000,000
snmp_core.cc
237,950,495,665,253,450,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-19132
Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.
https://nvd.nist.gov/vuln/detail/CVE-2018-19132
202,670
flatpak
902fb713990a8f968ea4350c7c2a27ff46f1a6c4
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/902fb713990a8f968ea4350c7c2a27ff46f1a6c4
Use seccomp to filter out TIOCSTI ioctl This would otherwise let the sandbox add input to the controlling tty.
1
setup_seccomp (GPtrArray *argv_array, GArray *fd_array, const char *arch, gboolean multiarch, gboolean devel, GError **error) { __attribute__((cleanup (cleanup_seccomp))) scmp_filter_ctx seccomp = NULL; /**** BEGIN NOTE ON COD...
126,201,198,414,475,670,000,000,000,000,000,000,000
flatpak-run.c
116,110,354,022,810,410,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-10063
Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ...
https://nvd.nist.gov/vuln/detail/CVE-2019-10063
336,364
flatpak
902fb713990a8f968ea4350c7c2a27ff46f1a6c4
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/902fb713990a8f968ea4350c7c2a27ff46f1a6c4
Use seccomp to filter out TIOCSTI ioctl This would otherwise let the sandbox add input to the controlling tty.
0
setup_seccomp (GPtrArray *argv_array, GArray *fd_array, const char *arch, gboolean multiarch, gboolean devel, GError **error) { __attribute__((cleanup (cleanup_seccomp))) scmp_filter_ctx seccomp = NULL; /**** BEGIN NOTE ON COD...
210,146,810,537,379,230,000,000,000,000,000,000,000
flatpak-run.c
51,821,770,144,244,430,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-10063
Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ...
https://nvd.nist.gov/vuln/detail/CVE-2019-10063
202,671
leptonica
8d6e1755518cfb98536d6c3daf0601f226d16842
https://github.com/DanBloomberg/leptonica
https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842
Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel() * Check pix boundary when looking for the next pixel.
1
findNextBorderPixel(l_int32 w, l_int32 h, l_uint32 *data, l_int32 wpl, l_int32 px, l_int32 py, l_int32 *pqpos, l_int32 *pnpx, l_int32 *pnp...
172,879,270,821,373,000,000,000,000,000,000,000,000
ccbord.c
107,849,461,100,282,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-36278
Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-36278
336,425
leptonica
8d6e1755518cfb98536d6c3daf0601f226d16842
https://github.com/DanBloomberg/leptonica
https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842
Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel() * Check pix boundary when looking for the next pixel.
0
findNextBorderPixel(l_int32 w, l_int32 h, l_uint32 *data, l_int32 wpl, l_int32 px, l_int32 py, l_int32 *pqpos, l_int32 *pnpx, l_int32 *pnp...
11,574,903,189,996,028,000,000,000,000,000,000,000
ccbord.c
209,192,668,763,824,270,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-36278
Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-36278
202,673
libsass
0bc35e3d26922229d5a3e3308860cf0fcee5d1cf
https://github.com/sass/libsass
https://github.com/sass/libsass/commit/0bc35e3d26922229d5a3e3308860cf0fcee5d1cf
Fix segfault on empty custom properties Originally reported in sass/sassc#225 Fixes sass/sassc#225 Spec sass/sass-spec#1249
1
Statement_Ptr Expand::operator()(Declaration_Ptr d) { Block_Obj ab = d->block(); String_Obj old_p = d->property(); Expression_Obj prop = old_p->perform(&eval); String_Obj new_p = Cast<String>(prop); // we might get a color back if (!new_p) { std::string str(prop->to_string(ctx.c_option...
5,288,536,904,599,497,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-11695
An issue was discovered in LibSass <3.5.3. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-11695
336,456
libsass
0bc35e3d26922229d5a3e3308860cf0fcee5d1cf
https://github.com/sass/libsass
https://github.com/sass/libsass/commit/0bc35e3d26922229d5a3e3308860cf0fcee5d1cf
Fix segfault on empty custom properties Originally reported in sass/sassc#225 Fixes sass/sassc#225 Spec sass/sass-spec#1249
0
Statement_Ptr Expand::operator()(Declaration_Ptr d) { Block_Obj ab = d->block(); String_Obj old_p = d->property(); Expression_Obj prop = old_p->perform(&eval); String_Obj new_p = Cast<String>(prop); // we might get a color back if (!new_p) { std::string str(prop->to_string(ctx.c_option...
127,883,527,826,979,700,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-11695
An issue was discovered in LibSass <3.5.3. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-11695
202,676
ImageMagick
d4145e664aea3752ca6d3bf1ee825352b595dab5
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d4145e664aea3752ca6d3bf1ee825352b595dab5
https://github.com/ImageMagick/ImageMagick/issues/682
1
static Image *ReadSFWImage(const ImageInfo *image_info,ExceptionInfo *exception) { static unsigned char HuffmanTable[] = { 0xFF, 0xC4, 0x01, 0xA2, 0x00, 0x00, 0x01, 0x05, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0...
244,939,699,971,169,320,000,000,000,000,000,000,000
sfw.c
95,046,131,770,927,390,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-12983
Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12983
336,478
ImageMagick
d4145e664aea3752ca6d3bf1ee825352b595dab5
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d4145e664aea3752ca6d3bf1ee825352b595dab5
https://github.com/ImageMagick/ImageMagick/issues/682
0
static Image *ReadSFWImage(const ImageInfo *image_info,ExceptionInfo *exception) { static unsigned char HuffmanTable[] = { 0xFF, 0xC4, 0x01, 0xA2, 0x00, 0x00, 0x01, 0x05, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0...
27,675,606,765,677,550,000,000,000,000,000,000,000
sfw.c
64,214,199,085,540,595,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-12983
Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12983
202,679
sysstat
a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed
https://github.com/sysstat/sysstat
https://github.com/sysstat/sysstat/commit/a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed
Fix #242: Double free in check_file_actlst() Avoid freeing buffer() twice. Signed-off-by: Sebastien GODARD <sysstat@users.noreply.github.com>
1
void check_file_actlst(int *ifd, char *dfile, struct activity *act[], uint64_t flags, struct file_magic *file_magic, struct file_header *file_hdr, struct file_activity **file_actlst, unsigned int id_seq[], int ignore, int *endian_mismatch, int *arch_64) { int i, j, k, p; struct file_activit...
173,264,044,164,024,700,000,000,000,000,000,000,000
sa_common.c
43,739,889,268,322,440,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-19725
sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-19725
336,699
sysstat
a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed
https://github.com/sysstat/sysstat
https://github.com/sysstat/sysstat/commit/a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed
Fix #242: Double free in check_file_actlst() Avoid freeing buffer() twice. Signed-off-by: Sebastien GODARD <sysstat@users.noreply.github.com>
0
void check_file_actlst(int *ifd, char *dfile, struct activity *act[], uint64_t flags, struct file_magic *file_magic, struct file_header *file_hdr, struct file_activity **file_actlst, unsigned int id_seq[], int ignore, int *endian_mismatch, int *arch_64) { int i, j, k, p; struct file_activit...
53,197,963,354,301,790,000,000,000,000,000,000,000
sa_common.c
331,634,466,050,993,950,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-19725
sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-19725
202,718
exiv2
783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b
Improve bound checking in WebPImage::doWriteMetadata()
1
void WebPImage::doWriteMetadata(BasicIo& outIo) { if (!io_->isopen()) throw Error(kerInputDataReadFailed); if (!outIo.isopen()) throw Error(kerImageWriteFailed); #ifdef EXIV2_DEBUG_MESSAGES std::cout << "Writing metadata" << std::endl; #endif byte data [WEBP_TAG_SIZE*3]; ...
92,778,462,470,457,700,000,000,000,000,000,000,000
webpimage.cpp
124,403,017,614,491,700,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29463
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentia...
https://nvd.nist.gov/vuln/detail/CVE-2021-29463
337,774
exiv2
783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b
Improve bound checking in WebPImage::doWriteMetadata()
0
void WebPImage::doWriteMetadata(BasicIo& outIo) { if (!io_->isopen()) throw Error(kerInputDataReadFailed); if (!outIo.isopen()) throw Error(kerImageWriteFailed); #ifdef EXIV2_DEBUG_MESSAGES std::cout << "Writing metadata" << std::endl; #endif byte data [WEBP_TAG_SIZE*3]; ...
48,051,940,479,489,540,000,000,000,000,000,000,000
webpimage.cpp
37,303,076,579,972,948,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29463
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentia...
https://nvd.nist.gov/vuln/detail/CVE-2021-29463
202,720
ImageMagick6
ae3eecad2f59e27123c1a6c891be75d06fc03656
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ae3eecad2f59e27123c1a6c891be75d06fc03656
https://github.com/ImageMagick/ImageMagick/issues/1191
1
static MagickBooleanType WriteMIFFImage(const ImageInfo *image_info, Image *image) { #if defined(MAGICKCORE_BZLIB_DELEGATE) bz_stream bzip_info; #endif char buffer[MaxTextExtent]; CompressionType compression; const char *property, *value; IndexPacket index; #if defined(MAGICKCOR...
149,196,027,850,495,320,000,000,000,000,000,000,000
miff.c
7,651,543,122,002,567,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14436
ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14436
337,863
ImageMagick6
ae3eecad2f59e27123c1a6c891be75d06fc03656
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ae3eecad2f59e27123c1a6c891be75d06fc03656
https://github.com/ImageMagick/ImageMagick/issues/1191
0
static MagickBooleanType WriteMIFFImage(const ImageInfo *image_info, Image *image) { #if defined(MAGICKCORE_BZLIB_DELEGATE) bz_stream bzip_info; #endif char buffer[MaxTextExtent]; CompressionType compression; const char *property, *value; IndexPacket index; #if defined(MAGICKCOR...
179,959,574,243,725,370,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2018-14436
ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14436
202,737
qemu
2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
qcow2: Validate active L1 table offset and size (CVE-2014-0144) This avoids an unbounded allocation. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
1
static int qcow2_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVQcowState *s = bs->opaque; int len, i, ret = 0; QCowHeader header; QemuOpts *opts; Error *local_err = NULL; uint64_t ext_end; uint64_t l1_vm_state_index; const char *opt_overl...
181,458,126,158,566,800,000,000,000,000,000,000,000
qcow2.c
221,937,655,733,254,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
338,452
qemu
2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
qcow2: Validate active L1 table offset and size (CVE-2014-0144) This avoids an unbounded allocation. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
0
static int qcow2_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVQcowState *s = bs->opaque; int len, i, ret = 0; QCowHeader header; QemuOpts *opts; Error *local_err = NULL; uint64_t ext_end; uint64_t l1_vm_state_index; const char *opt_overl...
283,629,623,680,026,030,000,000,000,000,000,000,000
qcow2.c
294,111,040,411,264,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
202,743
libevent
7b21c4eabf1f3946d3f63cce1319c490caab8ecf
https://github.com/libevent/libevent
https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf
Fix CVE-2014-6272 in Libevent 1.4 For this fix, we need to make sure that passing too-large inputs to the evbuffer functions can't make us do bad things with the heap.
1
evbuffer_expand(struct evbuffer *buf, size_t datlen) { size_t need = buf->misalign + buf->off + datlen; /* If we can fit all the data, then we don't have to do anything */ if (buf->totallen >= need) return (0); /* * If the misalignment fulfills our data needs, we just force an * alignment to happen. Afterw...
258,002,302,375,317,420,000,000,000,000,000,000,000
buffer.c
249,511,286,500,344,070,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6272
Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe...
https://nvd.nist.gov/vuln/detail/CVE-2014-6272
338,737
libevent
7b21c4eabf1f3946d3f63cce1319c490caab8ecf
https://github.com/libevent/libevent
https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf
Fix CVE-2014-6272 in Libevent 1.4 For this fix, we need to make sure that passing too-large inputs to the evbuffer functions can't make us do bad things with the heap.
0
evbuffer_expand(struct evbuffer *buf, size_t datlen) { size_t used = buf->misalign + buf->off; size_t need; assert(buf->totallen >= used); /* If we can fit all the data, then we don't have to do anything */ if (buf->totallen - used >= datlen) return (0); /* If we would need to overflow to fit this much data, ...
268,520,221,436,341,230,000,000,000,000,000,000,000
buffer.c
95,787,474,149,316,780,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6272
Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe...
https://nvd.nist.gov/vuln/detail/CVE-2014-6272
202,744
libevent
7b21c4eabf1f3946d3f63cce1319c490caab8ecf
https://github.com/libevent/libevent
https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf
Fix CVE-2014-6272 in Libevent 1.4 For this fix, we need to make sure that passing too-large inputs to the evbuffer functions can't make us do bad things with the heap.
1
evbuffer_add(struct evbuffer *buf, const void *data, size_t datlen) { size_t need = buf->misalign + buf->off + datlen; size_t oldoff = buf->off; if (buf->totallen < need) { if (evbuffer_expand(buf, datlen) == -1) return (-1); } memcpy(buf->buffer + buf->off, data, datlen); buf->off += datlen; if (datlen ...
5,736,669,242,917,229,000,000,000,000,000,000,000
buffer.c
249,511,286,500,344,070,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6272
Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe...
https://nvd.nist.gov/vuln/detail/CVE-2014-6272
338,735
libevent
7b21c4eabf1f3946d3f63cce1319c490caab8ecf
https://github.com/libevent/libevent
https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf
Fix CVE-2014-6272 in Libevent 1.4 For this fix, we need to make sure that passing too-large inputs to the evbuffer functions can't make us do bad things with the heap.
0
evbuffer_add(struct evbuffer *buf, const void *data, size_t datlen) { size_t used = buf->misalign + buf->off; size_t oldoff = buf->off; if (buf->totallen - used < datlen) { if (evbuffer_expand(buf, datlen) == -1) return (-1); } memcpy(buf->buffer + buf->off, data, datlen); buf->off += datlen; if (datlen ...
207,201,496,878,315,000,000,000,000,000,000,000,000
buffer.c
95,787,474,149,316,780,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6272
Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe...
https://nvd.nist.gov/vuln/detail/CVE-2014-6272
202,749
ntp
aa44b5835d69d8ee031736bb8ee2730a514edb7d
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/aa44b5835d69d8ee031736bb8ee2730a514edb7d
[Bug 2941] NAK to the Future: Symmetric association authentication bypass via crypto-NAK
1
receive( struct recvbuf *rbufp ) { register struct peer *peer; /* peer structure pointer */ register struct pkt *pkt; /* receive packet pointer */ u_char hisversion; /* packet version */ u_char hisleap; /* packet leap indicator */ u_char hismode; /* packet mode */ u_char hisstratum; /* packet stratum */ u_...
207,583,480,244,479,900,000,000,000,000,000,000,000
ntp_proto.c
222,291,288,462,871,040,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2015-7871
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
https://nvd.nist.gov/vuln/detail/CVE-2015-7871
338,758
ntp
aa44b5835d69d8ee031736bb8ee2730a514edb7d
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/aa44b5835d69d8ee031736bb8ee2730a514edb7d
[Bug 2941] NAK to the Future: Symmetric association authentication bypass via crypto-NAK
0
receive( struct recvbuf *rbufp ) { register struct peer *peer; /* peer structure pointer */ register struct pkt *pkt; /* receive packet pointer */ u_char hisversion; /* packet version */ u_char hisleap; /* packet leap indicator */ u_char hismode; /* packet mode */ u_char hisstratum; /* packet stratum */ u_...
106,546,781,098,312,270,000,000,000,000,000,000,000
ntp_proto.c
221,627,888,879,819,700,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2015-7871
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
https://nvd.nist.gov/vuln/detail/CVE-2015-7871
202,750
php-src
f59b67ae50064560d7bfcdb0d6a8ab284179053c
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=f59b67ae50064560d7bfcdb0d6a8ab284179053c
Fix bug #69441 (Buffer Overflow when parsing tar/zip/phar in phar_set_inode)
1
static inline void phar_set_inode(phar_entry_info *entry TSRMLS_DC) /* {{{ */ { char tmp[MAXPATHLEN]; int tmp_len; tmp_len = entry->filename_len + entry->phar->fname_len; memcpy(tmp, entry->phar->fname, entry->phar->fname_len); memcpy(tmp + entry->phar->fname_len, entry->filename, entry->filename_len); entry->in...
219,335,175,601,115,100,000,000,000,000,000,000,000
phar_internal.h
114,870,493,938,035,640,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-3329
Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
https://nvd.nist.gov/vuln/detail/CVE-2015-3329
338,768
php-src
f59b67ae50064560d7bfcdb0d6a8ab284179053c
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=f59b67ae50064560d7bfcdb0d6a8ab284179053c
Fix bug #69441 (Buffer Overflow when parsing tar/zip/phar in phar_set_inode)
0
static inline void phar_set_inode(phar_entry_info *entry TSRMLS_DC) /* {{{ */ { char tmp[MAXPATHLEN]; int tmp_len; size_t len; tmp_len = MIN(MAXPATHLEN, entry->filename_len + entry->phar->fname_len); len = MIN(entry->phar->fname_len, tmp_len); memcpy(tmp, entry->phar->fname, len); len = MIN(tmp_len - len, entry...
117,243,625,454,876,130,000,000,000,000,000,000,000
phar_internal.h
132,409,715,055,506,560,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-3329
Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
https://nvd.nist.gov/vuln/detail/CVE-2015-3329
202,753
ImageMagick
e9438e2a82d35b6657e908ff38ec0303f432b655
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e9438e2a82d35b6657e908ff38ec0303f432b655
1
MagickExport MagickBooleanType SetImageProfile(Image *image,const char *name, const StringInfo *profile,ExceptionInfo *exception) { char key[MaxTextExtent], property[MaxTextExtent]; MagickBooleanType status; assert(image != (Image *) NULL); assert(image->signature == MagickSignature); if (imag...
174,791,167,146,507,160,000,000,000,000,000,000,000
profile.c
152,454,561,839,162,220,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5841
Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-5841
338,813
ImageMagick
e9438e2a82d35b6657e908ff38ec0303f432b655
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e9438e2a82d35b6657e908ff38ec0303f432b655
0
MagickExport MagickBooleanType SetImageProfile(Image *image,const char *name, const StringInfo *profile,ExceptionInfo *exception) { char key[MaxTextExtent], property[MaxTextExtent]; MagickBooleanType status; assert(image != (Image *) NULL); assert(image->signature == MagickSignature); if (imag...
15,343,324,730,894,308,000,000,000,000,000,000,000
profile.c
81,897,102,697,449,440,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5841
Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-5841
202,754
php-src
8d6e9588671136837533fe3785657c31c5b52767
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767
Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx Due to a signedness confusion in `GetCode_` a corrupt GIF file can trigger an infinite loop. Furthermore we make sure that a GIF without any palette entries is treated as invalid *after* open palette entries have been removed.
1
GetCode_(gdIOCtx *fd, CODE_STATIC_DATA *scd, int code_size, int flag, int *ZeroDataBlockP) { int i, j, ret; unsigned char count; if (flag) { scd->curbit = 0; scd->lastbit = 0; scd->last_byte = 0; scd->done = FALSE; return 0; } if ( (scd->curbit + code_size) >= scd->lastbit) { if (scd->done)...
138,763,629,742,682,900,000,000,000,000,000,000,000
gd_gif_in.c
241,141,288,263,991,960,000,000,000,000,000,000,000
[ "CWE-681" ]
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func...
https://nvd.nist.gov/vuln/detail/CVE-2018-5711
338,820
php-src
8d6e9588671136837533fe3785657c31c5b52767
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767
Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx Due to a signedness confusion in `GetCode_` a corrupt GIF file can trigger an infinite loop. Furthermore we make sure that a GIF without any palette entries is treated as invalid *after* open palette entries have been removed.
0
GetCode_(gdIOCtx *fd, CODE_STATIC_DATA *scd, int code_size, int flag, int *ZeroDataBlockP) { int i, j, ret; int count; if (flag) { scd->curbit = 0; scd->lastbit = 0; scd->last_byte = 0; scd->done = FALSE; return 0; } if ( (scd->curbit + code_size) >= scd->lastbit) { if (scd->done)...
161,543,679,821,867,840,000,000,000,000,000,000,000
gd_gif_in.c
287,685,970,223,625,050,000,000,000,000,000,000,000
[ "CWE-681" ]
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func...
https://nvd.nist.gov/vuln/detail/CVE-2018-5711
202,755
php-src
8d6e9588671136837533fe3785657c31c5b52767
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767
Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx Due to a signedness confusion in `GetCode_` a corrupt GIF file can trigger an infinite loop. Furthermore we make sure that a GIF without any palette entries is treated as invalid *after* open palette entries have been removed.
1
gdImagePtr gdImageCreateFromGifCtx(gdIOCtxPtr fd) /* {{{ */ { int BitPixel; #if 0 int ColorResolution; int Background; int AspectRatio; #endif int Transparent = (-1); unsigned char buf[16]; unsigned char c; unsigned char ColorMap[3][MAXCOLORMAPSIZE]; unsigned char localColorMap[3][MAXCOLORMAPSIZE]; in...
313,802,163,547,854,540,000,000,000,000,000,000,000
gd_gif_in.c
241,141,288,263,991,960,000,000,000,000,000,000,000
[ "CWE-681" ]
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func...
https://nvd.nist.gov/vuln/detail/CVE-2018-5711
338,830
php-src
8d6e9588671136837533fe3785657c31c5b52767
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767
Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx Due to a signedness confusion in `GetCode_` a corrupt GIF file can trigger an infinite loop. Furthermore we make sure that a GIF without any palette entries is treated as invalid *after* open palette entries have been removed.
0
gdImagePtr gdImageCreateFromGifCtx(gdIOCtxPtr fd) /* {{{ */ { int BitPixel; #if 0 int ColorResolution; int Background; int AspectRatio; #endif int Transparent = (-1); unsigned char buf[16]; unsigned char c; unsigned char ColorMap[3][MAXCOLORMAPSIZE]; unsigned char localColorMap[3][MAXCOLORMAPSIZE]; in...
153,204,163,225,487,950,000,000,000,000,000,000,000
gd_gif_in.c
287,685,970,223,625,050,000,000,000,000,000,000,000
[ "CWE-681" ]
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func...
https://nvd.nist.gov/vuln/detail/CVE-2018-5711
202,756
samba
42f0f57eb819ce6b68a8c5b3b53123b83ec917e3
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=42f0f57eb819ce6b68a8c5b3b53123b83ec917e3
CVE-2019-3824 ldb: wildcard_match end of data check ldb_handler_copy and ldb_val_dup over allocate by one and add a trailing '\0' to the data, to make them safe to use the C string functions on. However testing for the trailing '\0' is not the correct way to test for the end of a value, the length should be checked i...
1
static int ldb_wildcard_compare(struct ldb_context *ldb, const struct ldb_parse_tree *tree, const struct ldb_val value, bool *matched) { const struct ldb_schema_attribute *a; struct ldb_val val; struct ldb_val cnk; struct ldb_val *chunk; uint8_t *save_p = NULL; unsigned int c = 0; if (tree->operation !=...
56,469,481,359,652,000,000,000,000,000,000,000,000
ldb_match.c
49,898,241,021,989,480,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3824
A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-3824
338,831
samba
42f0f57eb819ce6b68a8c5b3b53123b83ec917e3
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=42f0f57eb819ce6b68a8c5b3b53123b83ec917e3
CVE-2019-3824 ldb: wildcard_match end of data check ldb_handler_copy and ldb_val_dup over allocate by one and add a trailing '\0' to the data, to make them safe to use the C string functions on. However testing for the trailing '\0' is not the correct way to test for the end of a value, the length should be checked i...
0
static int ldb_wildcard_compare(struct ldb_context *ldb, const struct ldb_parse_tree *tree, const struct ldb_val value, bool *matched) { const struct ldb_schema_attribute *a; struct ldb_val val; struct ldb_val cnk; struct ldb_val *chunk; uint8_t *save_p = NULL; unsigned int c = 0; if (tree->operation !=...
247,268,373,891,928,130,000,000,000,000,000,000,000
ldb_match.c
16,539,850,727,413,788,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3824
A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-3824
202,802
libyang
4e610ccd87a2ba9413819777d508f71163fcc237
https://github.com/CESNET/libyang
https://github.com/CESNET/libyang/commit/4e610ccd87a2ba9413819777d508f71163fcc237
resovle BUGFIX handle cyclic typedefs with unions Fixes #724
1
resolve_superior_type(const char *name, const char *mod_name, const struct lys_module *module, const struct lys_node *parent, struct lys_tpdf **ret) { int i, j; struct lys_tpdf *tpdf, *match; int tpdf_size; if (!mod_name) { /* no prefix, try built-in types */ for (...
62,652,768,450,615,000,000,000,000,000,000,000,000
resolve.c
313,540,992,145,494,900,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2019-20395
A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-20395
340,010
libyang
4e610ccd87a2ba9413819777d508f71163fcc237
https://github.com/CESNET/libyang
https://github.com/CESNET/libyang/commit/4e610ccd87a2ba9413819777d508f71163fcc237
resovle BUGFIX handle cyclic typedefs with unions Fixes #724
0
resolve_superior_type(const char *name, const char *mod_name, const struct lys_module *module, const struct lys_node *parent, struct lys_tpdf **ret) { int i, j; struct lys_tpdf *tpdf, *match; int tpdf_size; if (!mod_name) { /* no prefix, try built-in types */ for (...
292,323,429,525,372,080,000,000,000,000,000,000,000
resolve.c
182,290,416,952,737,500,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2019-20395
A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-20395
202,807
exiv2
ccde30afa8ca787a3fe17388a15977f107a53b72
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/ccde30afa8ca787a3fe17388a15977f107a53b72
Avoid null pointer exception due to NULL return value from strchr. This fixes #793. (cherry picked from commit ae20c30805b330275b2aa0303a42e1f2bbd53661)
1
int Exiv2::http(Exiv2::Dictionary& request, Exiv2::Dictionary& response, std::string& errors) { if (!request.count("verb")) request["verb"] = "GET"; if (!request.count("header")) request["header"] = ""; if (!request.count("version")) request["version"] = "1.0"; if (!request.count...
135,866,303,970,236,680,000,000,000,000,000,000,000
http.cpp
94,030,703,909,831,260,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-13114
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
https://nvd.nist.gov/vuln/detail/CVE-2019-13114
340,164
exiv2
ccde30afa8ca787a3fe17388a15977f107a53b72
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/ccde30afa8ca787a3fe17388a15977f107a53b72
Avoid null pointer exception due to NULL return value from strchr. This fixes #793. (cherry picked from commit ae20c30805b330275b2aa0303a42e1f2bbd53661)
0
int Exiv2::http(Exiv2::Dictionary& request, Exiv2::Dictionary& response, std::string& errors) { if (!request.count("verb")) request["verb"] = "GET"; if (!request.count("header")) request["header"] = ""; if (!request.count("version")) request["version"] = "1.0"; if (!request.count...
109,959,079,745,263,880,000,000,000,000,000,000,000
http.cpp
152,943,462,568,779,240,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-13114
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
https://nvd.nist.gov/vuln/detail/CVE-2019-13114
202,809
Little-CMS
d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f
https://github.com/mm2/Little-CMS
https://github.com/mm2/Little-CMS/commit/d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f
Contributed fixes from Oracle Two minor glitches
1
void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag) { cmsMLU* mlu; cmsUInt32Number Count, RecLen, NumOfWchar; cmsUInt32Number SizeOfHeader; cmsUInt32Number Len, Offset; cmsUInt32Number i; wchar_t* Block; cm...
67,941,377,606,327,030,000,000,000,000,000,000,000
cmstypes.c
27,306,885,815,607,413,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10165
The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
https://nvd.nist.gov/vuln/detail/CVE-2016-10165
340,285
Little-CMS
d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f
https://github.com/mm2/Little-CMS
https://github.com/mm2/Little-CMS/commit/d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f
Contributed fixes from Oracle Two minor glitches
0
void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag) { cmsMLU* mlu; cmsUInt32Number Count, RecLen, NumOfWchar; cmsUInt32Number SizeOfHeader; cmsUInt32Number Len, Offset; cmsUInt32Number i; wchar_t* Block; cm...
177,716,566,585,391,640,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10165
The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
https://nvd.nist.gov/vuln/detail/CVE-2016-10165
202,820
gdal
27b9bf644bcf1208f7d6594bdd104cc8a8bb0646
https://github.com/OSGeo/gdal
https://github.com/OSGeo/gdal/commit/27b9bf644bcf1208f7d6594bdd104cc8a8bb0646
KML: set OAMS_TRADITIONAL_GIS_ORDER for SRS returned on returned layers
1
OGRKMLLayer::OGRKMLLayer( const char * pszName, OGRSpatialReference *poSRSIn, bool bWriterIn, OGRwkbGeometryType eReqType, OGRKMLDataSource *poDSIn ) : poDS_(poDSIn), poSRS_(poSRSIn ? new OGRSpatialReference(nullptr) : nullptr), p...
177,036,789,674,555,420,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-25050
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
https://nvd.nist.gov/vuln/detail/CVE-2019-25050
341,806
gdal
27b9bf644bcf1208f7d6594bdd104cc8a8bb0646
https://github.com/OSGeo/gdal
https://github.com/OSGeo/gdal/commit/27b9bf644bcf1208f7d6594bdd104cc8a8bb0646
KML: set OAMS_TRADITIONAL_GIS_ORDER for SRS returned on returned layers
0
OGRKMLLayer::OGRKMLLayer( const char * pszName, OGRSpatialReference *poSRSIn, bool bWriterIn, OGRwkbGeometryType eReqType, OGRKMLDataSource *poDSIn ) : poDS_(poDSIn), poSRS_(poSRSIn ? new OGRSpatialReference(nullptr) : nullptr), p...
156,707,627,039,653,970,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-25050
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
https://nvd.nist.gov/vuln/detail/CVE-2019-25050
202,821
LibRaw
fbf60377c006eaea8d3eca3f5e4c654909dcdfd2
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/fbf60377c006eaea8d3eca3f5e4c654909dcdfd2
possible buffer overrun in Fuji makernotes parser
1
void CLASS parse_makernote(int base, int uptag) { unsigned offset = 0, entries, tag, type, len, save, c; unsigned ver97 = 0, serial = 0, i, wbi = 0, wb[4] = {0, 0, 0, 0}; uchar buf97[324], ci, cj, ck; short morder, sorder = order; char buf[10]; unsigned SamsungKey[11]; uchar NikonKey; #ifdef LIBRAW_LIBRA...
245,099,950,230,763,780,000,000,000,000,000,000,000
dcraw.c
229,640,459,242,852,870,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20337
There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-20337
341,815
LibRaw
fbf60377c006eaea8d3eca3f5e4c654909dcdfd2
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/fbf60377c006eaea8d3eca3f5e4c654909dcdfd2
possible buffer overrun in Fuji makernotes parser
0
void CLASS parse_makernote(int base, int uptag) { unsigned offset = 0, entries, tag, type, len, save, c; unsigned ver97 = 0, serial = 0, i, wbi = 0, wb[4] = {0, 0, 0, 0}; uchar buf97[324], ci, cj, ck; short morder, sorder = order; char buf[10]; unsigned SamsungKey[11]; uchar NikonKey; #ifdef LIBRAW_LIBRA...
13,687,180,071,373,584,000,000,000,000,000,000,000
dcraw.c
222,400,528,597,494,960,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20337
There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-20337
202,859
unzip
41beb477c5744bc396fa1162ee0c14218ec12213
https://github.com/madler/unzip
https://github.com/madler/unzip/commit/41beb477c5744bc396fa1162ee0c14218ec12213
Fix bug in undefer_input() that misplaced the input state.
1
void undefer_input(__G) __GDEF { if (G.incnt > 0) G.csize += G.incnt; if (G.incnt_leftover > 0) { /* We know that "(G.csize < MAXINT)" so we can cast G.csize to int: * This condition was checked when G.incnt_leftover was set > 0 in * defer_leftover_input(), and it is NOT al...
201,548,250,008,552,570,000,000,000,000,000,000,000
fileio.c
104,350,303,231,404,350,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-13232
Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a "better zip bomb" issue.
https://nvd.nist.gov/vuln/detail/CVE-2019-13232
342,220
unzip
41beb477c5744bc396fa1162ee0c14218ec12213
https://github.com/madler/unzip
https://github.com/madler/unzip/commit/41beb477c5744bc396fa1162ee0c14218ec12213
Fix bug in undefer_input() that misplaced the input state.
0
void undefer_input(__G) __GDEF { if (G.incnt > 0) G.csize += G.incnt; if (G.incnt_leftover > 0) { /* We know that "(G.csize < MAXINT)" so we can cast G.csize to int: * This condition was checked when G.incnt_leftover was set > 0 in * defer_leftover_input(), and it is NOT al...
19,245,495,331,780,902,000,000,000,000,000,000,000
fileio.c
68,302,145,772,017,100,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-13232
Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a "better zip bomb" issue.
https://nvd.nist.gov/vuln/detail/CVE-2019-13232
202,872
php-src
16023f3e3b9c06cf677c3c980e8d574e4c162827
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827
Fix bug #70014 - use RAND_bytes instead of deprecated RAND_pseudo_bytes
1
PHP_FUNCTION(openssl_random_pseudo_bytes) { long buffer_length; unsigned char *buffer = NULL; zval *zstrong_result_returned = NULL; int strong_result = 0; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|z", &buffer_length, &zstrong_result_returned) == FAILURE) { return; } if (buffer_length <= 0) { ...
228,946,703,246,556,400,000,000,000,000,000,000,000
openssl.c
163,815,054,224,334,570,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2015-8867
The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2015-8867
342,657
php-src
16023f3e3b9c06cf677c3c980e8d574e4c162827
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827
Fix bug #70014 - use RAND_bytes instead of deprecated RAND_pseudo_bytes
0
PHP_FUNCTION(openssl_random_pseudo_bytes) { long buffer_length; unsigned char *buffer = NULL; zval *zstrong_result_returned = NULL; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|z", &buffer_length, &zstrong_result_returned) == FAILURE) { return; } if (buffer_length <= 0) { RETURN_FALSE; } if (z...
83,921,683,825,600,060,000,000,000,000,000,000,000
openssl.c
102,206,558,694,905,060,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2015-8867
The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2015-8867
202,883
openldap
21981053a1195ae1555e23df4d9ac68d34ede9dd
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
ITS#9408 fix vrfilter double-free
1
static int parseValuesReturnFilter ( Operation *op, SlapReply *rs, LDAPControl *ctrl ) { BerElement *ber; struct berval fstr = BER_BVNULL; if ( op->o_valuesreturnfilter != SLAP_CONTROL_NONE ) { rs->sr_text = "valuesReturnFilter control specified multiple times"; return LDAP_PROTOCOL_ERROR; } if ( BER_BVIS...
184,920,899,360,584,040,000,000,000,000,000,000,000
controls.c
101,078,862,250,692,510,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-36223
A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
https://nvd.nist.gov/vuln/detail/CVE-2020-36223
342,671
openldap
21981053a1195ae1555e23df4d9ac68d34ede9dd
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
ITS#9408 fix vrfilter double-free
0
static int parseValuesReturnFilter ( Operation *op, SlapReply *rs, LDAPControl *ctrl ) { BerElement *ber; struct berval fstr = BER_BVNULL; if ( op->o_valuesreturnfilter != SLAP_CONTROL_NONE ) { rs->sr_text = "valuesReturnFilter control specified multiple times"; return LDAP_PROTOCOL_ERROR; } if ( BER_BVIS...
64,228,264,464,227,220,000,000,000,000,000,000,000
controls.c
95,237,790,161,033,520,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-36223
A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
https://nvd.nist.gov/vuln/detail/CVE-2020-36223
202,887
php-src
57b997ebf99e0eb9a073e0dafd2ab100bd4a112d
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=57b997ebf99e0eb9a073e0dafd2ab100bd4a112d
Fix bug #71637: Multiple Heap Overflow due to integer overflows
1
PHP_XML_API zend_string *xml_utf8_encode(const char *s, size_t len, const XML_Char *encoding) { size_t pos = len; zend_string *str; unsigned int c; unsigned short (*encoder)(unsigned char) = NULL; xml_encoding *enc = xml_get_encoding(encoding); if (enc) { encoder = enc->encoding_function; } else { /* If the...
289,950,792,986,275,400,000,000,000,000,000,000,000
xml.c
326,784,863,109,640,340,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-4344
Integer overflow in the xml_utf8_encode function in ext/xml/xml.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long argument to the utf8_encode function, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2016-4344
343,062
php-src
57b997ebf99e0eb9a073e0dafd2ab100bd4a112d
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=57b997ebf99e0eb9a073e0dafd2ab100bd4a112d
Fix bug #71637: Multiple Heap Overflow due to integer overflows
0
PHP_XML_API zend_string *xml_utf8_encode(const char *s, size_t len, const XML_Char *encoding) { size_t pos = len; zend_string *str; unsigned int c; unsigned short (*encoder)(unsigned char) = NULL; xml_encoding *enc = xml_get_encoding(encoding); if (enc) { encoder = enc->encoding_function; } else { /* If the...
294,439,925,128,511,730,000,000,000,000,000,000,000
xml.c
136,056,318,812,614,570,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-4344
Integer overflow in the xml_utf8_encode function in ext/xml/xml.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long argument to the utf8_encode function, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2016-4344
202,891
ImageMagick6
4745eb1047617330141e9abfd5ae01236a71ae12
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/4745eb1047617330141e9abfd5ae01236a71ae12
https://github.com/ImageMagick/ImageMagick/issues/1249
1
static StringInfo *ParseImageResourceBlocks(Image *image, const unsigned char *blocks,size_t length, MagickBooleanType *has_merged_image) { const unsigned char *p; StringInfo *profile; unsigned char name_length; unsigned int count; unsigned short id, short_sans; if (length <...
172,661,296,687,898,700,000,000,000,000,000,000,000
psd.c
54,127,472,608,036,960,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16412
ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.
https://nvd.nist.gov/vuln/detail/CVE-2018-16412