idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
14,221 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcWarpPointer(ClientPtr client)
{
WindowPtr dest = NULL;
int x, y, rc;
ScreenPtr newScreen;
DeviceIntPtr dev, tmp;
SpritePtr pSprite;
REQUEST(xWarpPointerReq);
REQUEST_SIZE_MATCH(xWarpPointerReq);
dev = PickPointer(client);
for (tmp = inputInfo.devices; tmp; tmp = tmp->next) {
... | 249,820,069,164,926,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,222 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ReattachToOldMaster(DeviceIntPtr dev)
{
DeviceIntPtr master = NULL;
if (IsMaster(dev))
return;
dixLookupDevice(&master, dev->saved_master_id, serverClient, DixUseAccess);
if (master) {
AttachDevice(serverClient, dev, master);
dev->saved_master_id = 0;
}
}
| 98,261,461,191,060,660,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,223 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | RecalculateDeliverableEvents(WindowPtr pWin)
{
OtherClients *others;
WindowPtr pChild;
pChild = pWin;
while (1) {
if (pChild->optional) {
pChild->optional->otherEventMasks = 0;
for (others = wOtherClients(pChild); others; others = others->next) {
pChild->... | 176,429,977,748,082,140,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,224 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ReinitializeRootWindow(WindowPtr win, int xoff, int yoff)
{
GrabPtr grab;
DeviceIntPtr pDev;
SpritePtr pSprite;
if (noPanoramiXExtension)
return;
pDev = inputInfo.devices;
while (pDev) {
if (DevHasCursor(pDev)) {
pSprite = pDev->spriteInfo->sprite;
pSpri... | 315,228,359,918,645,770,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,225 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ReleaseActiveGrabs(ClientPtr client)
{
DeviceIntPtr dev;
Bool done;
/* XXX CloseDownClient should remove passive grabs before
* releasing active grabs.
*/
do {
done = TRUE;
for (dev = inputInfo.devices; dev; dev = dev->next) {
if (dev->deviceGrab.grab &&
... | 334,920,263,217,993,650,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,226 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ScreenRestructured(ScreenPtr pScreen)
{
GrabPtr grab;
DeviceIntPtr pDev;
for (pDev = inputInfo.devices; pDev; pDev = pDev->next) {
if (!IsFloating(pDev) && !DevHasCursor(pDev))
continue;
/* GrabDevice doesn't have a confineTo field, so we don't need to
* worry about it... | 102,397,942,896,666,310,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,227 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SetClientPointer(ClientPtr client, DeviceIntPtr device)
{
int rc = XaceHook(XACE_DEVICE_ACCESS, client, device, DixUseAccess);
if (rc != Success)
return rc;
if (!IsMaster(device)) {
ErrorF("[dix] Need master device for ClientPointer. This is a bug.\n");
return BadDevice;
}
... | 201,523,196,505,465,960,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,228 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SetCriticalEvent(int event)
{
if (event >= MAXEVENTS)
FatalError("SetCriticalEvent: bogus event number");
criticalEvents[event >> 3] |= 1 << (event & 7);
}
| 255,746,922,498,035,600,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,229 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SetInputFocus(ClientPtr client,
DeviceIntPtr dev,
Window focusID, CARD8 revertTo, Time ctime, Bool followOK)
{
FocusClassPtr focus;
WindowPtr focusWin;
int mode, rc;
TimeStamp time;
DeviceIntPtr keybd; /* used for FollowKeyboard or FollowKeyboardWin */
Update... | 156,143,103,345,728,350,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,230 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SetMaskForEvent(int deviceid, Mask mask, int event)
{
if (deviceid < 0 || deviceid >= MAXDEVICES)
FatalError("SetMaskForEvent: bogus device id");
event_filters[deviceid][event] = mask;
}
| 120,366,175,162,915,200,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,231 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SyntheticMotion(DeviceIntPtr dev, int x, int y)
{
int screenno = 0;
#ifdef PANORAMIX
if (!noPanoramiXExtension)
screenno = dev->spriteInfo->sprite->screen->myNum;
#endif
PostSyntheticMotion(dev, x, y, screenno,
(syncEvents.playingEvents) ? syncEvents.time.
... | 212,755,897,737,991,500,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,232 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | UpdateSpriteForScreen(DeviceIntPtr pDev, ScreenPtr pScreen)
{
SpritePtr pSprite = NULL;
WindowPtr win = NULL;
CursorPtr pCursor;
if (!pScreen)
return;
if (!pDev->spriteInfo->sprite)
return;
pSprite = pDev->spriteInfo->sprite;
win = pScreen->root;
pSprite->hotPhys.pSc... | 75,211,143,208,583,550,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,233 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | UpdateTouchesForGrab(DeviceIntPtr mouse)
{
int i;
if (!mouse->touch || mouse->deviceGrab.fromPassiveGrab)
return;
for (i = 0; i < mouse->touch->num_touches; i++) {
TouchPointInfoPtr ti = mouse->touch->touches + i;
TouchListener *listener = &ti->listeners[0];
GrabPtr grab = ... | 331,545,387,902,052,250,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,234 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | WindowXI2MaskIsset(DeviceIntPtr dev, WindowPtr win, xEvent *ev)
{
OtherInputMasks *inputMasks = wOtherInputMasks(win);
int evtype;
if (!inputMasks || xi2_get_type(ev) == 0)
return 0;
evtype = ((xGenericEvent *) ev)->evtype;
return xi2mask_isset(inputMasks->xi2mask, dev, evtype);
}
| 15,816,932,625,075,570,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,235 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | WindowsRestructured(void)
{
DeviceIntPtr pDev = inputInfo.devices;
while (pDev) {
if (IsMaster(pDev) || IsFloating(pDev))
CheckMotion(NULL, pDev);
pDev = pDev->next;
}
}
| 198,270,453,253,508,100,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,236 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XItoCoreType(int xitype)
{
int coretype = 0;
if (xitype == DeviceMotionNotify)
coretype = MotionNotify;
else if (xitype == DeviceButtonPress)
coretype = ButtonPress;
else if (xitype == DeviceButtonRelease)
coretype = ButtonRelease;
else if (xitype == DeviceKeyPress)
... | 89,076,609,016,118,350,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,237 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XYToWindow(SpritePtr pSprite, int x, int y)
{
ScreenPtr pScreen = RootWindow(pSprite)->drawable.pScreen;
return (*pScreen->XYToWindow)(pScreen, pSprite, x, y);
}
| 53,043,531,628,856,005,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,238 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaConfineCursorToWindow(DeviceIntPtr pDev,
WindowPtr pWin, Bool generateEvents)
{
SpritePtr pSprite = pDev->spriteInfo->sprite;
int x, y, off_x, off_y, i;
if (!XineramaSetWindowPntrs(pDev, pWin))
return;
i = PanoramiXNumScreens - 1;
RegionCopy(&pSprite... | 255,503,216,432,807,400,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,239 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaConstrainCursor(DeviceIntPtr pDev)
{
SpritePtr pSprite = pDev->spriteInfo->sprite;
ScreenPtr pScreen;
BoxRec newBox;
pScreen = pSprite->screen;
newBox = pSprite->physLimits;
/* Translate the constraining box to the screen
the sprite is actually on */
newBox.x1 += screenInfo.... | 315,456,834,939,326,000,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,240 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaGetCursorScreen(DeviceIntPtr pDev)
{
if (!noPanoramiXExtension) {
return pDev->spriteInfo->sprite->screen->myNum;
}
else {
return 0;
}
}
| 323,611,867,603,870,100,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,241 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaPointInWindowIsVisible(WindowPtr pWin, int x, int y)
{
BoxRec box;
int i, xoff, yoff;
if (!pWin->realized)
return FALSE;
if (RegionContainsPoint(&pWin->borderClip, x, y, &box))
return TRUE;
if (!XineramaSetWindowPntrs(inputInfo.pointer, pWin))
return FALSE;
x... | 132,907,785,513,446,080,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,242 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaSetCursorPosition(DeviceIntPtr pDev, int x, int y, Bool generateEvent)
{
ScreenPtr pScreen;
int i;
SpritePtr pSprite = pDev->spriteInfo->sprite;
/* x,y are in Screen 0 coordinates. We need to decide what Screen
to send the message too and what the coordinates relative to
that scr... | 235,922,108,645,378,600,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,243 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaSetWindowPntrs(DeviceIntPtr pDev, WindowPtr pWin)
{
SpritePtr pSprite = pDev->spriteInfo->sprite;
if (pWin == screenInfo.screens[0]->root) {
int i;
FOR_NSCREENS(i)
pSprite->windows[i] = screenInfo.screens[i]->root;
}
else {
PanoramiXRes *win;
int rc,... | 259,460,388,380,377,600,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,244 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaTryClientEventsResult(ClientPtr client,
GrabPtr grab, Mask mask, Mask filter)
{
if ((client) && (client != serverClient) && (!client->clientGone) &&
((filter == CantBeFiltered) || (mask & filter))) {
if (grab && !SameClient(grab, client))
return -1;
... | 52,892,376,082,155,540,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,245 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | XineramaWarpPointer(ClientPtr client)
{
WindowPtr dest = NULL;
int x, y, rc;
SpritePtr pSprite = PickPointer(client)->spriteInfo->sprite;
REQUEST(xWarpPointerReq);
if (stuff->dstWid != None) {
rc = dixLookupWindow(&dest, stuff->dstWid, client, DixReadAccess);
if (rc != Success)
... | 59,367,925,099,704,250,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,246 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | core_get_type(const xEvent *event)
{
int type = event->u.u.type;
return ((type & EXTENSION_EVENT_BASE) || type == GenericEvent) ? 0 : type;
}
| 170,721,441,217,823,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,247 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcChangeProperty(ClientPtr client)
{
REQUEST(xChangePropertyReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xChangePropertyReq);
swapl(&stuff->window);
swapl(&stuff->property);
swapl(&stuff->type);
swapl(&stuff->nUnits);
switch (stuff->format) {
case 8:
break;
case ... | 333,278,318,917,752,830,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,248 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcChangeWindowAttributes(ClientPtr client)
{
REQUEST(xChangeWindowAttributesReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xChangeWindowAttributesReq);
swapl(&stuff->window);
swapl(&stuff->valueMask);
SwapRestL(stuff);
return ((*ProcVector[X_ChangeWindowAttributes]) (client));
}
| 284,548,155,365,272,150,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,249 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcConfigureWindow(ClientPtr client)
{
REQUEST(xConfigureWindowReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xConfigureWindowReq);
swapl(&stuff->window);
swaps(&stuff->mask);
SwapRestL(stuff);
return ((*ProcVector[X_ConfigureWindow]) (client));
}
| 329,311,770,857,959,070,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,250 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcConvertSelection(ClientPtr client)
{
REQUEST(xConvertSelectionReq);
swaps(&stuff->length);
REQUEST_SIZE_MATCH(xConvertSelectionReq);
swapl(&stuff->requestor);
swapl(&stuff->selection);
swapl(&stuff->target);
swapl(&stuff->property);
swapl(&stuff->time);
return ((*ProcVector[X_Co... | 121,889,211,377,489,580,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,251 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcCreateWindow(ClientPtr client)
{
REQUEST(xCreateWindowReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xCreateWindowReq);
swapl(&stuff->wid);
swapl(&stuff->parent);
swaps(&stuff->x);
swaps(&stuff->y);
swaps(&stuff->width);
swaps(&stuff->height);
swaps(&stuff->borderWidth);... | 266,935,417,769,756,840,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,252 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcDeleteProperty(ClientPtr client)
{
REQUEST(xDeletePropertyReq);
swaps(&stuff->length);
REQUEST_SIZE_MATCH(xDeletePropertyReq);
swapl(&stuff->window);
swapl(&stuff->property);
return ((*ProcVector[X_DeleteProperty]) (client));
}
| 102,443,841,889,510,100,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,253 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcInternAtom(ClientPtr client)
{
REQUEST(xInternAtomReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xInternAtomReq);
swaps(&stuff->nbytes);
return ((*ProcVector[X_InternAtom]) (client));
}
| 243,802,479,741,789,660,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,254 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | SProcResourceReq(ClientPtr client)
{
REQUEST(xResourceReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xResourceReq); /* not EXACT */
swapl(&stuff->id);
return (*ProcVector[stuff->reqType]) (client);
}
| 295,903,804,875,069,600,000,000,000,000,000,000,000 | swapreq.c | 256,639,569,519,362,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,255 | xserver | 8caed4df36b1f802b4992edcfd282cbeeec35d9d | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d | Xi: Verify all events in ProcXSendExtensionEvent.
The requirement is that events have type in range
EXTENSION_EVENT_BASE..lastEvent, but it was tested
only for first event of all.
Signed-off-by: Michal Srb <msrb@suse.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
Signed-off-by: Peter Hutterer <peter.hutt... | 0 | SProcXSendExtensionEvent(ClientPtr client)
{
CARD32 *p;
int i;
xEvent eventT = { .u.u.type = 0 };
xEvent *eventP;
EventSwapPtr proc;
REQUEST(xSendExtensionEventReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq);
swapl(&stuff->destination);
swaps(&stuff->c... | 267,453,174,895,275,840,000,000,000,000,000,000,000 | sendexev.c | 261,021,984,177,706,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,257 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx)
{
if (ctx->cleanup)
ctx->cleanup(ctx);
if (ctx->param != NULL) {
if (ctx->parent == NULL)
X509_VERIFY_PARAM_free(ctx->param);
ctx->param = NULL;
}
if (ctx->tree != NULL) {
X509_policy_tree_free(ctx->tree);
... | 295,781,722,834,701,250,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,258 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_free(X509_STORE_CTX *ctx)
{
if (!ctx)
return;
X509_STORE_CTX_cleanup(ctx);
OPENSSL_free(ctx);
}
| 38,275,177,541,144,337,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,259 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | X509_CRL *X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx)
{
return ctx->current_crl;
}
| 230,616,429,965,004,200,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,260 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | X509 *X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx)
{
return ctx->current_issuer;
}
| 109,846,251,800,113,210,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,261 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | X509_VERIFY_PARAM *X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx)
{
return ctx->param;
}
| 139,041,814,810,737,050,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,262 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | X509_STORE_CTX *X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx)
{
return ctx->parent;
}
| 18,577,259,236,986,880,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,263 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx)
{
int i;
X509 *x;
STACK_OF(X509) *chain;
if (!ctx->chain || !(chain = sk_X509_dup(ctx->chain)))
return NULL;
for (i = 0; i < sk_X509_num(chain); i++) {
x = sk_X509_value(chain, i);
CRYPTO_add(&x->references, 1, CR... | 98,140,018,522,006,600,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,264 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | STACK_OF(X509) *X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx)
{
return ctx->chain;
}
| 229,486,297,940,498,830,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,265 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx)
{
return ctx->current_cert;
}
| 256,296,872,001,435,000,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,266 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_get_error(X509_STORE_CTX *ctx)
{
return ctx->error;
}
| 157,499,157,910,666,020,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,267 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx)
{
return ctx->error_depth;
}
| 181,460,356,408,314,160,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,268 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void *X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx)
{
return CRYPTO_get_ex_data(&ctx->ex_data, idx);
}
| 195,089,890,789,576,650,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,269 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_get_ex_new_index(long argl, void *argp,
CRYPTO_EX_new *new_func,
CRYPTO_EX_dup *dup_func,
CRYPTO_EX_free *free_func)
{
/*
* This function is (usually) called only once, by
* SSL_g... | 277,704,529,284,595,100,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,270 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509,
STACK_OF(X509) *chain)
{
int ret = 1;
ctx->ctx = store;
ctx->current_method = 0;
ctx->cert = x509;
ctx->untrusted = chain;
ctx->crls = NULL;
ctx->last_untrusted = 0;
ctx->other_ctx = NULL;... | 213,476,171,088,666,200,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,271 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | X509_STORE_CTX *X509_STORE_CTX_new(void)
{
X509_STORE_CTX *ctx;
ctx = (X509_STORE_CTX *)OPENSSL_malloc(sizeof(X509_STORE_CTX));
if (!ctx) {
X509err(X509_F_X509_STORE_CTX_NEW, ERR_R_MALLOC_FAILURE);
return NULL;
}
memset(ctx, 0, sizeof(X509_STORE_CTX));
return ctx;
}
| 264,710,798,311,679,100,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,272 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose,
int purpose, int trust)
{
int idx;
/* If purpose not set use default */
if (!purpose)
purpose = def_purpose;
/* If we have a purpose then check it is valid */
if (purpose) {
X5... | 227,392,223,791,576,660,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,273 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param)
{
if (ctx->param)
X509_VERIFY_PARAM_free(ctx->param);
ctx->param = param;
}
| 59,685,883,090,464,110,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,274 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x)
{
ctx->cert = x;
}
| 241,639,509,438,941,850,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,275 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_set_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk)
{
ctx->untrusted = sk;
}
| 95,378,769,824,607,000,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,276 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name)
{
const X509_VERIFY_PARAM *param;
param = X509_VERIFY_PARAM_lookup(name);
if (!param)
return 0;
return X509_VERIFY_PARAM_inherit(ctx->param, param);
}
| 236,719,074,199,601,340,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,277 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err)
{
ctx->error = err;
}
| 170,569,000,292,449,660,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,278 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data)
{
return CRYPTO_set_ex_data(&ctx->ex_data, idx, data);
}
| 196,050,070,068,698,000,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,279 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags)
{
X509_VERIFY_PARAM_set_flags(ctx->param, flags);
}
| 55,204,613,595,951,650,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,280 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose)
{
return X509_STORE_CTX_purpose_inherit(ctx, 0, purpose, 0);
}
| 121,194,855,238,206,640,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,281 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags,
time_t t)
{
X509_VERIFY_PARAM_set_time(ctx->param, t);
}
| 235,392,990,897,471,200,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,282 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust)
{
return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust);
}
| 281,961,145,279,567,300,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,283 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx,
int (*verify_cb) (int, X509_STORE_CTX *))
{
ctx->verify_cb = verify_cb;
}
| 31,697,873,294,437,490,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,284 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | void X509_STORE_CTX_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk)
{
ctx->other_ctx = sk;
ctx->get_issuer = get_issuer_sk;
}
| 31,986,130,846,623,103,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,285 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_cmp_current_time(const ASN1_TIME *ctm)
{
return X509_cmp_time(ctm, NULL);
}
| 211,629,776,446,133,330,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,286 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_cmp_time(const ASN1_TIME *ctm, time_t *cmp_time)
{
char *str;
ASN1_TIME atm;
long offset;
char buff1[24], buff2[24], *p;
int i, j, remaining;
p = buff1;
remaining = ctm->length;
str = (char *)ctm->data;
/*
* Note that the following (historical) code allows much more sl... | 42,516,620,700,749,433,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,287 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain)
{
EVP_PKEY *ktmp = NULL, *ktmp2;
int i, j;
if ((pkey != NULL) && !EVP_PKEY_missing_parameters(pkey))
return 1;
for (i = 0; i < sk_X509_num(chain); i++) {
ktmp = X509_get_pubkey(sk_X509_value(chain, i));
if (k... | 10,919,653,726,976,356,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,288 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | ASN1_TIME *X509_gmtime_adj(ASN1_TIME *s, long adj)
{
return X509_time_adj(s, adj, NULL);
}
| 226,840,130,291,325,180,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,289 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | ASN1_TIME *X509_time_adj(ASN1_TIME *s, long offset_sec, time_t *in_tm)
{
return X509_time_adj_ex(s, 0, offset_sec, in_tm);
}
| 97,409,617,897,005,690,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,290 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | ASN1_TIME *X509_time_adj_ex(ASN1_TIME *s,
int offset_day, long offset_sec, time_t *in_tm)
{
time_t t;
if (in_tm)
t = *in_tm;
else
time(&t);
if (s && !(s->flags & ASN1_STRING_FLAG_MSTRING)) {
if (s->type == V_ASN1_UTCTIME)
return ASN1_UTCT... | 76,509,303,154,976,230,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,291 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int cert_crl(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x)
{
int ok;
X509_REVOKED *rev;
/*
* The rules changed for this... previously if a CRL contained unhandled
* critical extensions it could still be used to indicate a certificate
* was revoked. This has since been changed since crit... | 323,892,405,578,483,420,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,292 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_cert(X509_STORE_CTX *ctx)
{
X509_CRL *crl = NULL, *dcrl = NULL;
X509 *x;
int ok, cnum;
unsigned int last_reasons;
cnum = ctx->error_depth;
x = sk_X509_value(ctx->chain, cnum);
ctx->current_cert = x;
ctx->current_issuer = NULL;
ctx->current_crl_score = 0;
ctx->cur... | 257,634,959,046,123,500,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,293 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_cert_time(X509_STORE_CTX *ctx, X509 *x)
{
time_t *ptime;
int i;
if (ctx->param->flags & X509_V_FLAG_USE_CHECK_TIME)
ptime = &ctx->param->check_time;
else
ptime = NULL;
i = X509_cmp_time(X509_get_notBefore(x), ptime);
if (i == 0) {
ctx->error = X509_V_ER... | 133,248,483,823,695,840,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,294 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_chain_extensions(X509_STORE_CTX *ctx)
{
#ifdef OPENSSL_NO_CHAIN_VERIFY
return 1;
#else
int i, ok = 0, must_be_ca, plen = 0;
X509 *x;
int (*cb) (int xok, X509_STORE_CTX *xctx);
int proxy_path_length = 0;
int purpose;
int allow_proxy_certs;
cb = ctx->verify_cb;
/*-
... | 154,608,733,547,769,270,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,295 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_crl(X509_STORE_CTX *ctx, X509_CRL *crl)
{
X509 *issuer = NULL;
EVP_PKEY *ikey = NULL;
int ok = 0, chnum, cnum;
cnum = ctx->error_depth;
chnum = sk_X509_num(ctx->chain) - 1;
/* if we have an alternative CRL issuer cert use that */
if (ctx->current_issuer)
issuer = ctx... | 1,211,479,154,073,217,300,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,296 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_crl_chain(X509_STORE_CTX *ctx,
STACK_OF(X509) *cert_path,
STACK_OF(X509) *crl_path)
{
X509 *cert_ta, *crl_ta;
cert_ta = sk_X509_value(cert_path, sk_X509_num(cert_path) - 1);
crl_ta = sk_X509_value(crl_path, sk_X509_num(crl_path) - 1);
... | 110,094,097,363,095,320,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,297 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_delta_base(X509_CRL *delta, X509_CRL *base)
{
/* Delta CRL must be a delta */
if (!delta->base_crl_number)
return 0;
/* Base must have a CRL number */
if (!base->crl_number)
return 0;
/* Issuer names must match */
if (X509_NAME_cmp(X509_CRL_get_issuer(base), X509... | 73,169,687,235,013,270,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,298 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer)
{
int ret;
ret = X509_check_issued(issuer, x);
if (ret == X509_V_OK)
return 1;
/* If we haven't asked for issuer errors don't set ctx */
if (!(ctx->param->flags & X509_V_FLAG_CB_ISSUER_CHECK))
return 0;
ctx->err... | 323,536,092,688,415,400,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,299 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_name_constraints(X509_STORE_CTX *ctx)
{
X509 *x;
int i, j, rv;
/* Check name constraints for all certificates */
for (i = sk_X509_num(ctx->chain) - 1; i >= 0; i--) {
x = sk_X509_value(ctx->chain, i);
/* Ignore self issued certs unless last in chain */
if (i && (x... | 197,514,088,683,345,220,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,300 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_policy(X509_STORE_CTX *ctx)
{
int ret;
if (ctx->parent)
return 1;
ret = X509_policy_check(&ctx->tree, &ctx->explicit_policy, ctx->chain,
ctx->param->policies, ctx->param->flags);
if (ret == 0) {
X509err(X509_F_CHECK_POLICY, ERR_R_MALLOC_FAILUR... | 13,587,717,652,884,840,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,301 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_revocation(X509_STORE_CTX *ctx)
{
int i, last, ok;
if (!(ctx->param->flags & X509_V_FLAG_CRL_CHECK))
return 1;
if (ctx->param->flags & X509_V_FLAG_CRL_CHECK_ALL)
last = sk_X509_num(ctx->chain) - 1;
else {
/* If checking CRL paths this isn't the EE certificate */
... | 24,040,398,070,464,230,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,302 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int check_trust(X509_STORE_CTX *ctx)
{
#ifdef OPENSSL_NO_CHAIN_VERIFY
return 1;
#else
int i, ok;
X509 *x;
int (*cb) (int xok, X509_STORE_CTX *xctx);
cb = ctx->verify_cb;
/* For now just check the last certificate in the chain */
i = sk_X509_num(ctx->chain) - 1;
x = sk_X509_value(ctx->... | 118,015,788,937,173,600,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,303 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int crl_crldp_check(X509 *x, X509_CRL *crl, int crl_score,
unsigned int *preasons)
{
int i;
if (crl->idp_flags & IDP_ONLYATTR)
return 0;
if (x->ex_flags & EXFLAG_CA) {
if (crl->idp_flags & IDP_ONLYUSER)
return 0;
} else {
if (crl->idp... | 58,711,699,200,072,390,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,304 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int crl_extension_match(X509_CRL *a, X509_CRL *b, int nid)
{
ASN1_OCTET_STRING *exta, *extb;
int i;
i = X509_CRL_get_ext_by_NID(a, nid, -1);
if (i >= 0) {
/* Can't have multiple occurrences */
if (X509_CRL_get_ext_by_NID(a, nid, i) != -1)
return 0;
exta = X509_... | 228,042,823,625,101,830,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,305 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int crldp_check_crlissuer(DIST_POINT *dp, X509_CRL *crl, int crl_score)
{
int i;
X509_NAME *nm = X509_CRL_get_issuer(crl);
/* If no CRLissuer return is successful iff don't need a match */
if (!dp->CRLissuer)
return ! !(crl_score & CRL_SCORE_ISSUER_NAME);
for (i = 0; i < sk_GENERAL_NA... | 187,198,825,094,575,600,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,306 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static X509 *find_issuer(X509_STORE_CTX *ctx, STACK_OF(X509) *sk, X509 *x)
{
int i;
X509 *issuer;
for (i = 0; i < sk_X509_num(sk); i++) {
issuer = sk_X509_value(sk, i);
if (ctx->check_issued(ctx, x, issuer))
return issuer;
}
return NULL;
}
| 264,026,246,061,203,650,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,307 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int get_crl_delta(X509_STORE_CTX *ctx,
X509_CRL **pcrl, X509_CRL **pdcrl, X509 *x)
{
int ok;
X509 *issuer = NULL;
int crl_score = 0;
unsigned int reasons;
X509_CRL *crl = NULL, *dcrl = NULL;
STACK_OF(X509_CRL) *skcrl;
X509_NAME *nm = X509_get_issuer_name(x);
... | 142,306,268,328,871,770,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,308 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int get_crl_score(X509_STORE_CTX *ctx, X509 **pissuer,
unsigned int *preasons, X509_CRL *crl, X509 *x)
{
int crl_score = 0;
unsigned int tmp_reasons = *preasons, crl_reasons;
/* First see if we can reject CRL straight away */
/* Invalid IDP cannot be processed */
i... | 87,584,633,249,262,410,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,309 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static void get_delta_sk(X509_STORE_CTX *ctx, X509_CRL **dcrl, int *pscore,
X509_CRL *base, STACK_OF(X509_CRL) *crls)
{
X509_CRL *delta;
int i;
if (!(ctx->param->flags & X509_V_FLAG_USE_DELTAS))
return;
if (!((ctx->current_cert->ex_flags | base->flags) & EXFLAG_FRESHEST)... | 203,303,882,260,281,180,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,310 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
{
*issuer = find_issuer(ctx, ctx->other_ctx, x);
if (*issuer) {
CRYPTO_add(&(*issuer)->references, 1, CRYPTO_LOCK_X509);
return 1;
} else
return 0;
}
| 8,260,738,838,227,042,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,311 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int idp_check_dp(DIST_POINT_NAME *a, DIST_POINT_NAME *b)
{
X509_NAME *nm = NULL;
GENERAL_NAMES *gens = NULL;
GENERAL_NAME *gena, *genb;
int i, j;
if (!a || !b)
return 1;
if (a->type == 1) {
if (!a->dpname)
return 0;
/* Case 1: two X509_NAME */
i... | 319,651,222,474,677,700,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,312 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int internal_verify(X509_STORE_CTX *ctx)
{
int ok = 0, n;
X509 *xs, *xi;
EVP_PKEY *pkey = NULL;
int (*cb) (int xok, X509_STORE_CTX *xctx);
cb = ctx->verify_cb;
n = sk_X509_num(ctx->chain);
ctx->error_depth = n - 1;
n--;
xi = sk_X509_value(ctx->chain, n);
if (ctx->check_... | 55,869,176,655,547,010,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,313 | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | Fix alternate chains certificate forgery issue
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to... | 0 | static int null_callback(int ok, X509_STORE_CTX *e)
{
return ok;
}
| 71,376,723,023,000,960,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-1793 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certific... | https://nvd.nist.gov/vuln/detail/CVE-2015-1793 |
14,331 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | bm_delta2_search (char const **tpp, char const *ep, char const *sp, int len,
char const *trans, char gc1, char gc2,
unsigned char const *d1, kwset_t kwset)
{
char const *tp = *tpp;
int d = len, skip = 0;
while (true)
{
int i = 2;
if (tr (trans, tp[-2]) == gc2)
... | 248,038,147,892,686,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,332 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | bmexec (kwset_t kwset, char const *text, size_t size)
{
/* Help the compiler inline bmexec_trans in two ways, depending on
whether kwset->trans is null. */
return (kwset->trans
? bmexec_trans (kwset, text, size)
: bmexec_trans (kwset, text, size));
}
| 292,497,658,767,064,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,333 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | cwexec (kwset_t kwset, char const *text, size_t len, struct kwsmatch *kwsmatch)
{
struct trie * const *next;
struct trie const *trie;
struct trie const *accept;
char const *beg, *lim, *mch, *lmch;
unsigned char c;
unsigned char const *delta;
int d;
char const *end, *qlim;
struct tree const *tree;
ch... | 213,346,681,780,103,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,334 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | hasevery (struct tree const *a, struct tree const *b)
{
if (!b)
return 1;
if (!hasevery(a, b->llink))
return 0;
if (!hasevery(a, b->rlink))
return 0;
while (a && b->label != a->label)
if (b->label < a->label)
a = a->llink;
else
a = a->rlink;
return !!a;
}
| 276,804,131,193,109,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,335 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | kwsalloc (char const *trans)
{
struct kwset *kwset = xmalloc (sizeof *kwset);
obstack_init (&kwset->obstack);
kwset->words = 0;
kwset->trie = obstack_alloc (&kwset->obstack, sizeof *kwset->trie);
kwset->trie->accepting = 0;
kwset->trie->links = NULL;
kwset->trie->parent = NULL;
kwset->trie->next = NULL... | 56,386,712,440,139,545,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,336 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | kwsfree (kwset_t kwset)
{
obstack_free (&kwset->obstack, NULL);
free (kwset);
}
| 162,399,315,120,373,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,337 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | kwsincr (kwset_t kwset, char const *text, size_t len)
{
struct trie *trie = kwset->trie;
char const *trans = kwset->trans;
text += len;
/* Descend the trie (built of reversed keywords) character-by-character,
installing new nodes when necessary. */
while (len--)
{
unsigned char uc = *--text;
... | 262,976,692,931,494,630,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,338 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | kwsprep (kwset_t kwset)
{
char const *trans = kwset->trans;
int i;
unsigned char deltabuf[NCHAR];
unsigned char *delta = trans ? deltabuf : kwset->delta;
/* Initial values for the delta table; will be changed later. The
delta entry for a given character is the smallest depth of any
node at which a... | 208,552,495,791,208,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.