idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
14,560 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | static void gx_ttfReader__ReleaseGlyph(ttfReader *self, int glyph_index)
{
gx_ttfReader *r = (gx_ttfReader *)self;
if (r->extra_glyph_index != glyph_index)
return;
r->extra_glyph_index = -1;
gs_glyph_data_free(&r->glyph_data, "gx_ttfReader__ReleaseExtraGlyph");
}
| 142,530,177,083,497,440,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,561 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | static void gx_ttfReader__Reset(gx_ttfReader *self)
{
if (self->extra_glyph_index != -1) {
self->extra_glyph_index = -1;
gs_glyph_data_free(&self->glyph_data, "gx_ttfReader__Reset");
}
self->error = false;
self->pos = 0;
}
| 168,409,078,251,237,240,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,562 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | static void gx_ttfReader__Seek(ttfReader *self, int nPos)
{
gx_ttfReader *r = (gx_ttfReader *)self;
r->pos = nPos;
}
| 27,149,157,762,356,127,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,563 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | static int gx_ttfReader__Tell(ttfReader *self)
{
gx_ttfReader *r = (gx_ttfReader *)self;
return r->pos;
}
| 240,267,415,861,986,270,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,564 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | gx_ttfReader *gx_ttfReader__create(gs_memory_t *mem)
{
gx_ttfReader *r = gs_alloc_struct(mem, gx_ttfReader, &st_gx_ttfReader, "gx_ttfReader__create");
if (r != NULL) {
r->super.Eof = gx_ttfReader__Eof;
r->super.Read = gx_ttfReader__Read;
r->super.Seek = gx_ttfReader__Seek;
r->su... | 26,142,844,088,108,183,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,565 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | gx_ttfReader__default_get_metrics(const ttfReader *ttf, uint glyph_index, bool bVertical,
short *sideBearing, unsigned short *nAdvance)
{
gx_ttfReader *self = (gx_ttfReader *)ttf;
float sbw[4];
int sbw_offset = bVertical;
int code;
int factor = self->pfont->data.uni... | 331,009,124,007,626,770,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,566 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | void gx_ttfReader__destroy(gx_ttfReader *self)
{
gs_free_object(self->memory, self, "gx_ttfReader__destroy");
}
| 79,593,293,578,172,860,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,567 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | void gx_ttfReader__set_font(gx_ttfReader *self, gs_font_type42 *pfont)
{
self->pfont = pfont;
self->super.get_metrics = gx_ttfReader__default_get_metrics;
}
| 158,584,095,502,809,720,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,568 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | int gx_ttf_outline(ttfFont *ttf, gx_ttfReader *r, gs_font_type42 *pfont, int glyph_index,
const gs_matrix *m, const gs_log2_scale_point *pscale,
gx_path *path, bool design_grid)
{
gx_ttfExport e;
ttfOutliner o;
gs_point char_size, subpix_origin;
gs_matrix post_transform;
/* Ghostscri... | 237,044,278,301,657,830,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,569 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | path_to_hinter(t1_hinter *h, gx_path *path)
{ int code;
gs_path_enum penum;
gs_fixed_point pts[3];
gs_fixed_point p = {0, 0}; /* initialize to avoid a warning */
bool first = true;
int op;
code = gx_path_enum_init(&penum, path);
if (code < 0)
return code;
while ((op = gx_path_... | 237,025,439,611,789,020,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,570 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | static inline float reminder(float v, int x)
{
return ((v / x) - floor(v / x)) * x;
}
| 276,790,090,165,000,270,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,571 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | stem_hint_handler(void *client_data, gx_san_sect *ss)
{
t1_hinter_aux *h = (t1_hinter_aux *)client_data;
if (ss->side_mask == 3) {
/* Orient horizontal hints to help with top/bottom alignment zones.
Otherwize glyphs may get a random height due to serif adjustsment. */
if (ss->xl > h-... | 257,960,629,922,763,300,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,572 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | transpose_path(gx_path *path)
{ segment *s = (segment *)path->first_subpath;
exch(path->bbox.p.x, path->bbox.p.y);
exch(path->bbox.q.x, path->bbox.q.y);
for (; s; s = s->next) {
if (s->type == s_curve) {
curve_segment *c = (curve_segment *)s;
exch(c->p1.x, c->p1.y);
... | 99,219,387,815,683,360,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,573 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | int ttfFont__Open_aux(ttfFont *self, ttfInterpreter *tti, gx_ttfReader *r, gs_font_type42 *pfont,
const gs_matrix * char_tm, const gs_log2_scale_point *log2_scale,
bool design_grid)
{
gs_point char_size, subpix_origin;
gs_matrix post_transform;
/*
* Ghostscript proceses a ... | 232,071,823,989,148,600,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,574 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | ttfFont *ttfFont__create(gs_font_dir *dir)
{
gs_memory_t *mem = dir->memory->stable_memory;
ttfFont *ttf;
if (dir->ttm == NULL) {
gx_ttfMemory *m = gs_alloc_struct(mem, gx_ttfMemory, &st_gx_ttfMemory, "ttfFont__create(gx_ttfMemory)");
if (!m)
return 0;
m->super.alloc_st... | 45,444,119,192,505,800,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,575 | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | None | 0 | void ttfFont__destroy(ttfFont *self, gs_font_dir *dir)
{
gs_memory_t *mem = dir->memory->stable_memory;
ttfFont__finit(self);
gs_free_object(mem, self, "ttfFont__destroy");
ttfInterpreter__release(&dir->tti);
gx_san__release(&dir->san);
if (dir->tti == NULL && dir->ttm != NULL) {
gs_fre... | 152,858,058,194,790,560,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
14,576 | ghostscript | 7755e67116e8973ee0e3b22d653df026a84fa01b | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=7755e67116e8973ee0e3b22d653df026a84fa01b | None | 0 | static void Ins_JMPR( INS_ARG )
{
CUR.IP += (Int)(args[0]);
CUR.step_ins = FALSE;
if(CUR.IP > CUR.codeSize ||
(CUR.code[CUR.IP] != 0x2D && CUR.code[CUR.IP - 1] == 0x2D))
/* The JPMR is meant to stop at the ENDF instruction to finish
* the function. However the programmer made a mi... | 172,485,663,840,957,000,000,000,000,000,000,000,000 | ttinterp.c | 139,966,561,060,943,070,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9726 | The Ins_MDRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9726 |
14,577 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | dbus_g_proxy_manager_get (DBusConnection *connection)
{
DBusGProxyManager *manager;
dbus_connection_allocate_data_slot (&g_proxy_manager_slot);
if (g_proxy_manager_slot < 0)
g_error ("out of memory");
g_static_mutex_lock (&connection_g_proxy_lock);
manager = dbus_connection_get_data (connection, g_... | 225,560,774,701,777,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,578 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | dbus_g_proxy_manager_list_all (DBusGProxyManager *manager)
{
GSList *ret;
ret = NULL;
if (manager->proxy_lists)
{
g_hash_table_foreach (manager->proxy_lists,
list_proxies_foreach,
&ret);
}
return ret;
}
| 294,433,032,915,279,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,579 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | dbus_g_proxy_manager_monitor_name_owner (DBusGProxyManager *manager,
const char *owner,
const char *name)
{
GSList *names;
GSList *link;
DBusGProxyNameOwnerInfo *nameinfo;
names = g_hash_table_lookup (manager->owner_names, owner);
link = g_slist_find_custom (names, name, find_nam... | 119,817,645,860,837,620,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,580 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | dbus_g_proxy_manager_register (DBusGProxyManager *manager,
DBusGProxy *proxy)
{
DBusGProxyList *list;
DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(proxy);
LOCK_MANAGER (manager);
if (manager->proxy_lists == NULL)
{
g_assert (manager->owner_names == NULL);
... | 62,928,892,076,989,150,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,581 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | dbus_g_proxy_manager_unmonitor_name_owner (DBusGProxyManager *manager,
const char *name)
{
DBusGProxyNameOwnerInfo *info;
const char *owner;
gboolean ret;
ret = dbus_g_proxy_manager_lookup_name_owner (manager, name, &info, &owner);
g_assert (ret);
g_assert (info != NULL);
g_assert (owner... | 163,206,738,219,330,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,582 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | dbus_g_proxy_manager_unref (DBusGProxyManager *manager)
{
g_assert (manager != NULL);
g_assert (manager->refcount > 0);
LOCK_MANAGER (manager);
manager->refcount -= 1;
if (manager->refcount == 0)
{
UNLOCK_MANAGER (manager);
if (manager->bus_proxy)
g_object_unref (manager->bus_proxy);
... | 207,467,680,141,901,940,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,583 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | g_proxy_get_signal_match_rule (DBusGProxy *proxy)
{
DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(proxy);
/* FIXME Escaping is required here */
if (priv->name)
return g_strdup_printf ("type='signal',sender='%s',path='%s',interface='%s'",
priv->name, priv->path, priv->interf... | 158,833,670,863,399,330,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,584 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | g_proxy_list_free (DBusGProxyList *list)
{
/* we don't hold a reference to the proxies in the list,
* as they ref the GProxyManager
*/
g_slist_free (list->proxies);
g_free (list);
}
| 28,012,246,611,522,945,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,585 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | g_proxy_list_new (DBusGProxy *first_proxy)
{
DBusGProxyList *list;
DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(first_proxy);
list = (void*) tristring_alloc_from_strings (G_STRUCT_OFFSET (DBusGProxyList, name),
priv->name,
... | 36,878,693,601,044,867,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,586 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | get_name_owner (DBusConnection *connection,
const char *name,
GError **error)
{
DBusError derror;
DBusMessage *request, *reply;
char *base_name;
dbus_error_init (&derror);
base_name = NULL;
reply = NULL;
request = dbus_message_new_method_call (DBUS_SERVICE_DBUS,
DBUS... | 126,741,529,555,146,870,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,587 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | get_owner_match_rule (const gchar *name)
{
return g_strdup_printf ("type='signal',sender='" DBUS_SERVICE_DBUS
"',path='" DBUS_PATH_DBUS
"',interface='" DBUS_INTERFACE_DBUS
"',member='NameOwnerChanged'"
",arg0='%s'", name);
}
| 241,519,473,028,672,750,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,588 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | guint_slice_free (gpointer data)
{
g_slice_free (guint, data);
}
| 69,286,086,374,882,740,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,589 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | insert_nameinfo (DBusGProxyManager *manager,
const char *owner,
DBusGProxyNameOwnerInfo *info)
{
GSList *names;
gboolean insert;
names = g_hash_table_lookup (manager->owner_names, owner);
/* Only need to g_hash_table_insert the first time */
insert = (names == NULL);
names = g_sl... | 5,819,691,621,943,157,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,590 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | list_proxies_foreach (gpointer key,
gpointer value,
gpointer user_data)
{
DBusGProxyList *list;
GSList **ret;
GSList *tmp;
list = value;
ret = user_data;
tmp = list->proxies;
while (tmp != NULL)
{
DBusGProxy *proxy = DBUS_G_PROXY (tmp->data);
... | 115,993,788,488,815,860,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,591 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | oom (void)
{
g_error ("no memory");
}
| 71,607,166,891,539,840,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,592 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | strequal_len (const char *a,
const char *b,
size_t *lenp)
{
size_t a_len;
size_t b_len;
a_len = strlen (a);
b_len = strlen (b);
if (a_len != b_len)
return FALSE;
if (memcmp (a, b, a_len) != 0)
return FALSE;
*lenp = a_len;
return TRUE;
}
| 86,659,313,762,811,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,593 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | tristring_alloc_from_strings (size_t padding_before,
const char *name,
const char *path,
const char *interface)
{
size_t name_len, iface_len, path_len, len;
char *tri;
if (name)
name_len = strlen (name);
else
... | 302,959,749,261,637,830,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,594 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | tristring_equal (gconstpointer a,
gconstpointer b)
{
const char *ap = a;
const char *bp = b;
size_t len;
if (!strequal_len (ap, bp, &len))
return FALSE;
ap += len + 1;
bp += len + 1;
if (!strequal_len (ap, bp, &len))
return FALSE;
ap += len + 1;
bp += len + 1;
if (str... | 149,912,757,392,685,380,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,595 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | tristring_from_message (DBusMessage *message)
{
const char *path;
const char *interface;
path = dbus_message_get_path (message);
interface = dbus_message_get_interface (message);
g_assert (path);
g_assert (interface);
return tristring_alloc_from_strings (0,
dbus... | 142,296,002,982,204,580,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,596 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | tristring_from_proxy (DBusGProxy *proxy)
{
DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(proxy);
return tristring_alloc_from_strings (0,
priv->name,
priv->path,
priv->interface);
}
| 90,709,961,877,578,520,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,597 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | tristring_hash (gconstpointer key)
{
const char *p = key;
guint h = *p;
if (h)
{
for (p += 1; *p != '\0'; p++)
h = (h << 5) - h + *p;
}
/* skip nul and do the next substring */
for (p += 1; *p != '\0'; p++)
h = (h << 5) - h + *p;
/* skip nul again and another substring */
for ... | 198,528,371,901,889,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,598 | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca | None | 0 | unassociate_proxies (gpointer key, gpointer val, gpointer user_data)
{
DBusGProxyList *list;
const char *name;
GSList *tmp;
DBusGProxyUnassociateData *data;
list = val;
data = user_data;
name = data->name;
for (tmp = list->proxies; tmp; tmp = tmp->next)
{
DBusGProxy *proxy = DBUS_G_PROXY (... | 119,892,305,891,147,540,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0292 | The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. | https://nvd.nist.gov/vuln/detail/CVE-2013-0292 |
14,609 | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323 | None | 0 | static inline int u16(const byte *p)
{
return (p[0] << 8) | p[1];
}
| 240,012,338,865,354,150,000,000,000,000,000,000,000 | xpsttf.c | 107,102,883,587,469,830,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9619 | The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9619 |
14,610 | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323 | None | 0 | static inline int u32(const byte *p)
{
return (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3];
}
| 335,515,854,641,345,100,000,000,000,000,000,000,000 | xpsttf.c | 107,102,883,587,469,830,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9619 | The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9619 |
14,611 | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323 | None | 0 | xps_true_callback_decode_glyph(gs_font *pfont, gs_glyph glyph, int ch, ushort *unicode_return, unsigned int length)
{
xps_font_t *font = pfont->client_data;
char *ur = (char *)unicode_return;
int u;
if (length == 0)
return 2;
u = xps_decode_font_char(font, glyph);
/* Unfortunate assumpt... | 135,448,517,279,392,320,000,000,000,000,000,000,000 | xpsttf.c | 107,102,883,587,469,830,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9619 | The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9619 |
14,612 | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323 | None | 0 | xps_true_callback_encode_char(gs_font *pfont, gs_char chr, gs_glyph_space_t spc)
{
xps_font_t *font = pfont->client_data;
int value;
value = xps_encode_font_char(font, chr);
if (value == 0)
return GS_NO_GLYPH;
return value;
}
| 55,780,569,689,528,290,000,000,000,000,000,000,000 | xpsttf.c | 107,102,883,587,469,830,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9619 | The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9619 |
14,613 | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323 | None | 0 | xps_true_callback_string_proc(gs_font_type42 *p42, ulong offset, uint length, const byte **pdata)
{
xps_font_t *font = p42->client_data;
if (offset + length > font->length)
{
*pdata = NULL;
return gs_throw2(-1, "font data access out of bounds (offset=%lu size=%u)", offset, length);
}
... | 21,344,698,573,276,280,000,000,000,000,000,000,000 | xpsttf.c | 107,102,883,587,469,830,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9619 | The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9619 |
14,614 | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323 | None | 0 | xps_true_get_glyph_index(gs_font_type42 *pfont42, gs_glyph glyph)
{
/* identity */
return glyph;
}
| 32,362,511,392,423,934,000,000,000,000,000,000,000 | xpsttf.c | 107,102,883,587,469,830,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9619 | The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9619 |
14,615 | ghostscript | 3c2aebbedd37fab054e80f2e315de07d7e9b5bdb | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3c2aebbedd37fab054e80f2e315de07d7e9b5bdb | None | 0 | xps_true_callback_glyph_name(gs_font *pfont, gs_glyph glyph, gs_const_string *pstr)
{
/* This function is copied verbatim from plfont.c */
int table_length;
int table_offset;
ulong format;
int numGlyphs;
uint glyph_name_index;
const byte *postp; /* post table pointer */
if (glyph >= G... | 44,989,565,693,314,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-9618 | The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9618 |
14,616 | ghostscript | c7c55972758a93350882c32147801a3485b010fe | http://git.ghostscript.com/?p=mupdf | None | None | 0 | static void Ins_MDRP( INS_ARG )
{
Int point;
TT_F26Dot6 distance,
org_dist;
point = (Int)args[0];
if ( BOUNDS( args[0], CUR.zp1.n_points ) )
{
/* Current version of FreeType silently ignores this out of bounds error
* and drops the instruction, see bu... | 167,825,600,788,309,180,000,000,000,000,000,000,000 | ttinterp.c | 236,068,805,462,462,100,000,000,000,000,000,000,000 | [] | None | None | https://nvd.nist.gov/vuln/detail/None |
14,617 | ghostscript | d2ab84732936b6e7e5a461dc94344902965e9a06 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06 | None | 0 | xps_decode_font_char(xps_font_t *font, int code)
{
int gid = xps_decode_font_char_imp(font, code);
if (gid == 0)
return code;
return gid;
}
| 217,163,101,298,483,200,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9610 | The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9610 |
14,618 | ghostscript | d2ab84732936b6e7e5a461dc94344902965e9a06 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06 | None | 0 | xps_decode_font_char_imp(xps_font_t *font, int code)
{
byte *table;
/* no cmap selected: return identity */
if (font->cmapsubtable <= 0)
return code;
table = font->data + font->cmapsubtable;
switch (u16(table))
{
case 0: /* Apple standard 1-to-1 mapping. */
{
... | 332,930,374,465,803,460,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9610 | The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9610 |
14,619 | ghostscript | d2ab84732936b6e7e5a461dc94344902965e9a06 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06 | None | 0 | xps_encode_font_char_imp(xps_font_t *font, int code)
{
byte *table;
/* no cmap selected: return identity */
if (font->cmapsubtable <= 0)
return code;
table = font->data + font->cmapsubtable;
switch (u16(table))
{
case 0: /* Apple standard 1-to-1 mapping. */
return table[co... | 184,464,050,977,881,200,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9610 | The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9610 |
14,620 | ghostscript | d2ab84732936b6e7e5a461dc94344902965e9a06 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06 | None | 0 | xps_measure_font_glyph(xps_context_t *ctx, xps_font_t *font, int gid, xps_glyph_metrics_t *mtx)
{
int head, format, loca, glyf;
int ofs, len;
int idx, i, n;
int hadv, vadv, vorg;
int vtop, ymax, desc;
int scale;
/* some insane defaults */
scale = 1000; /* units-per-em */
hadv = 50... | 105,315,959,507,302,620,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9610 | The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9610 |
14,621 | altlinux | ffe7058c70253d574b1963c7c93002bd410fddc9 | http://git.altlinux.org/people/ldv/packages/?p=pam | http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9 | None | 0 | cleanup (pam_handle_t *pamh UNUSED, void *data, int err UNUSED)
{
free (data);
}
| 33,007,043,247,723,163,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2010-4707 | The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file. | https://nvd.nist.gov/vuln/detail/CVE-2010-4707 |
14,622 | altlinux | ffe7058c70253d574b1963c7c93002bd410fddc9 | http://git.altlinux.org/people/ldv/packages/?p=pam | http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9 | None | 0 | pam_sm_open_session (pam_handle_t *pamh, int flags UNUSED,
int argc, const char **argv)
{
char *cookiefile = NULL, *xauthority = NULL,
*cookie = NULL, *display = NULL, *tmp = NULL,
*xauthlocalhostname = NULL;
const char *user, *xauth = NULL;
struct passwd *tpwd, *rpwd;
int fd, i, debug = 0;
int ... | 161,819,098,500,340,000,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2010-4707 | The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file. | https://nvd.nist.gov/vuln/detail/CVE-2010-4707 |
14,623 | altlinux | ffe7058c70253d574b1963c7c93002bd410fddc9 | http://git.altlinux.org/people/ldv/packages/?p=pam | http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9 | None | 0 | run_coprocess(pam_handle_t *pamh, const char *input, char **output,
uid_t uid, gid_t gid, const char *command, ...)
{
int ipipe[2], opipe[2], i;
char buf[LINE_MAX];
pid_t child;
char *buffer = NULL;
size_t buffer_size = 0;
va_list ap;
*output = NULL;
/* Create stdio pipery. */
if (pipe(ipipe) == -1) {... | 335,965,787,766,231,970,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2010-4707 | The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file. | https://nvd.nist.gov/vuln/detail/CVE-2010-4707 |
14,624 | altlinux | 05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123 | http://git.altlinux.org/people/ldv/packages/?p=pam | http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123 | None | 0 | check_acl(pam_handle_t *pamh,
const char *sense, const char *this_user, const char *other_user,
int noent_code, int debug)
{
char path[PATH_MAX];
struct passwd *pwd;
FILE *fp = NULL;
int i, fd = -1, save_errno;
uid_t fsuid;
struct stat st;
/* Check this user's <sense> file. */
pwd = pam_modutil_getpwnam(p... | 103,683,347,779,132,160,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-4706 | The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check. | https://nvd.nist.gov/vuln/detail/CVE-2010-4706 |
14,632 | openssl | 66e8211c0b1347970096e04b18aa52567c325200 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=66e8211c0b1347970096e04b18aa52567c325200 | Don't try and verify signatures if key is NULL (CVE-2013-0166)
Add additional check to catch this in ASN1_item_verify too. | 0 | int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature,
char *data, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
const EVP_MD *type;
unsigned char *p,*buf_in=NULL;
int ret= -1,i,inl;
EVP_MD_CTX_init(&ctx);
i=OBJ_obj2nid(a->algorithm);
type=EVP_get_digestbyname(OBJ_nid2sn(i));
if (type == NULL)
{... | 65,746,564,338,361,610,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0166 | OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key. | https://nvd.nist.gov/vuln/detail/CVE-2013-0166 |
14,633 | openssl | ebc71865f0506a293242bd4aec97cdc7a8ef24b0 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ebc71865f0506a293242bd4aec97cdc7a8ef24b0 | Don't try and verify signatures if key is NULL (CVE-2013-0166)
Add additional check to catch this in ASN1_item_verify too. | 0 | int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature,
char *data, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
const EVP_MD *type;
unsigned char *p,*buf_in=NULL;
int ret= -1,i,inl;
EVP_MD_CTX_init(&ctx);
i=OBJ_obj2nid(a->algorithm);
type=EVP_get_digestbyname(OBJ_nid2sn(i));
if (type == NULL)
{... | 226,146,486,295,836,600,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0166 | OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key. | https://nvd.nist.gov/vuln/detail/CVE-2013-0166 |
14,634 | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310 | s3: smbd: Don't loop infinitely on bad-symlink resolution.
In the FILE_OPEN_IF case we have O_CREAT, but not
O_EXCL. Previously we went into a loop trying first
~(O_CREAT|O_EXCL), and if that returned ENOENT
try (O_CREAT|O_EXCL). We kept looping indefinately
until we got an error, or the file was created or
opened.
T... | 0 | void change_file_owner_to_parent(connection_struct *conn,
const char *inherit_from_dir,
files_struct *fsp)
{
struct smb_filename *smb_fname_parent;
int ret;
smb_fname_parent = synthetic_smb_fname(talloc_tos(),
inherit_from_dir,
NULL,
NULL,
0);
if (smb_fname_parent == NULL) {
return;... | 110,677,895,137,802,780,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-9461 | smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. | https://nvd.nist.gov/vuln/detail/CVE-2017-9461 |
14,635 | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310 | s3: smbd: Don't loop infinitely on bad-symlink resolution.
In the FILE_OPEN_IF case we have O_CREAT, but not
O_EXCL. Previously we went into a loop trying first
~(O_CREAT|O_EXCL), and if that returned ENOENT
try (O_CREAT|O_EXCL). We kept looping indefinately
until we got an error, or the file was created or
opened.
T... | 0 | static NTSTATUS check_base_file_access(struct connection_struct *conn,
struct smb_filename *smb_fname,
uint32_t access_mask)
{
NTSTATUS status;
status = smbd_calculate_access_mask(conn, smb_fname,
false,
access_mask,
&access_mask);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(10, ("smbd_calculate_... | 18,273,853,255,462,540,000,000,000,000,000,000,000 | open.c | 59,822,861,259,288,750,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-9461 | smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. | https://nvd.nist.gov/vuln/detail/CVE-2017-9461 |
14,636 | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310 | s3: smbd: Don't loop infinitely on bad-symlink resolution.
In the FILE_OPEN_IF case we have O_CREAT, but not
O_EXCL. Previously we went into a loop trying first
~(O_CREAT|O_EXCL), and if that returned ENOENT
try (O_CREAT|O_EXCL). We kept looping indefinately
until we got an error, or the file was created or
opened.
T... | 0 | NTSTATUS check_parent_access(struct connection_struct *conn,
struct smb_filename *smb_fname,
uint32_t access_mask)
{
NTSTATUS status;
char *parent_dir = NULL;
struct security_descriptor *parent_sd = NULL;
uint32_t access_granted = 0;
struct smb_filename *parent_smb_fname = NULL;
if (!parent_dirname(tallo... | 229,511,403,409,907,970,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-9461 | smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. | https://nvd.nist.gov/vuln/detail/CVE-2017-9461 |
14,637 | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310 | s3: smbd: Don't loop infinitely on bad-symlink resolution.
In the FILE_OPEN_IF case we have O_CREAT, but not
O_EXCL. Previously we went into a loop trying first
~(O_CREAT|O_EXCL), and if that returned ENOENT
try (O_CREAT|O_EXCL). We kept looping indefinately
until we got an error, or the file was created or
opened.
T... | 0 | NTSTATUS fd_close(files_struct *fsp)
{
int ret;
if (fsp->dptr) {
dptr_CloseDir(fsp);
}
if (fsp->fh->fd == -1) {
return NT_STATUS_OK; /* What we used to call a stat open. */
}
if (fsp->fh->ref_count > 1) {
return NT_STATUS_OK; /* Shared handle. Only close last reference. */
}
ret = SMB_VFS_CLOSE(fsp);
f... | 245,100,943,223,612,500,000,000,000,000,000,000,000 | open.c | 59,822,861,259,288,750,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-9461 | smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. | https://nvd.nist.gov/vuln/detail/CVE-2017-9461 |
14,638 | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310 | s3: smbd: Don't loop infinitely on bad-symlink resolution.
In the FILE_OPEN_IF case we have O_CREAT, but not
O_EXCL. Previously we went into a loop trying first
~(O_CREAT|O_EXCL), and if that returned ENOENT
try (O_CREAT|O_EXCL). We kept looping indefinately
until we got an error, or the file was created or
opened.
T... | 0 | NTSTATUS fd_open(struct connection_struct *conn,
files_struct *fsp,
int flags,
mode_t mode)
{
struct smb_filename *smb_fname = fsp->fsp_name;
NTSTATUS status = NT_STATUS_OK;
#ifdef O_NOFOLLOW
/*
* Never follow symlinks on a POSIX client. The
* client should be doing this.
*/
if ((fsp->posix_flags ... | 103,231,122,520,810,960,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-9461 | smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. | https://nvd.nist.gov/vuln/detail/CVE-2017-9461 |
14,639 | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310 | s3: smbd: Don't loop infinitely on bad-symlink resolution.
In the FILE_OPEN_IF case we have O_CREAT, but not
O_EXCL. Previously we went into a loop trying first
~(O_CREAT|O_EXCL), and if that returned ENOENT
try (O_CREAT|O_EXCL). We kept looping indefinately
until we got an error, or the file was created or
opened.
T... | 0 | static bool parent_override_delete(connection_struct *conn,
const struct smb_filename *smb_fname,
uint32_t access_mask,
uint32_t rejected_mask)
{
if ((access_mask & DELETE_ACCESS) &&
(rejected_mask & DELETE_ACCESS) &&
can_delete_file_in_directory(conn, smb_fname)) {
return true;
}
return... | 40,914,486,067,641,863,000,000,000,000,000,000,000 | open.c | 59,822,861,259,288,750,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-9461 | smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. | https://nvd.nist.gov/vuln/detail/CVE-2017-9461 |
14,640 | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310 | s3: smbd: Don't loop infinitely on bad-symlink resolution.
In the FILE_OPEN_IF case we have O_CREAT, but not
O_EXCL. Previously we went into a loop trying first
~(O_CREAT|O_EXCL), and if that returned ENOENT
try (O_CREAT|O_EXCL). We kept looping indefinately
until we got an error, or the file was created or
opened.
T... | 0 | NTSTATUS smbd_check_access_rights(struct connection_struct *conn,
const struct smb_filename *smb_fname,
bool use_privs,
uint32_t access_mask)
{
/* Check if we have rights to open. */
NTSTATUS status;
struct security_descriptor *sd = NULL;
uint32_t rejected_share_access;
uint32_t rejected_mask = access_... | 280,604,910,114,723,800,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-9461 | smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. | https://nvd.nist.gov/vuln/detail/CVE-2017-9461 |
14,700 | openssl | d0666f289ac013094bbbf547bfbcd616199b7d2d | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d0666f289ac013094bbbf547bfbcd616199b7d2d | evp: prevent underflow in base64 decoding
This patch resolves RT ticket #2608.
Thanks to Robert Dugal for originally spotting this, and to David
Ramos for noticing that the ball had been dropped.
Signed-off-by: Geoff Thorpe <geoff@openssl.org> | 0 | void EVP_DecodeInit(EVP_ENCODE_CTX *ctx)
{
ctx->length=30;
ctx->num=0;
ctx->line_num=0;
ctx->expect_nl=0;
}
| 262,736,147,000,663,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-0292 | Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 da... | https://nvd.nist.gov/vuln/detail/CVE-2015-0292 |
14,701 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain)
{
return tls1_check_chain(s, x, pk, chain, -1);
}
| 202,870,273,123,534,900,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,702 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int SSL_get_shared_sigalgs(SSL *s, int idx,
int *psign, int *phash, int *psignhash,
unsigned char *rsig, unsigned char *rhash)
{
TLS_SIGALGS *shsigalgs = s->cert->shared_sigalgs;
if (!shsigalgs || idx >= (int)s->cert->shared_sigalgslen)
return 0;
... | 141,238,580,166,260,330,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,703 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int SSL_get_sigalgs(SSL *s, int idx,
int *psign, int *phash, int *psignhash,
unsigned char *rsig, unsigned char *rhash)
{
const unsigned char *psig = s->cert->peer_sigalgs;
if (psig == NULL)
return 0;
if (idx >= 0) {
idx <<= 1;
if (idx >= (int)... | 239,009,021,814,542,300,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,704 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int sig_cb(const char *elem, int len, void *arg)
{
sig_cb_st *sarg = arg;
size_t i;
char etmp[20], *p;
int sig_alg, hash_alg;
if (elem == NULL)
return 0;
if (sarg->sigalgcnt == MAX_SIGALGLEN)
return 0;
if (len > (int)(sizeof(etmp) - 1))
return 0;
memcpy(etm... | 69,700,957,621,570,980,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,705 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf,
unsigned char *limit, int *al)
{
int extdatalen = 0;
unsigned char *orig = buf;
unsigned char *ret = buf;
# ifndef OPENSSL_NO_EC
/* See if we support any ECC ciphersuites */
int using_ecc ... | 267,878,755,159,607,580,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,706 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | unsigned char *ssl_add_serverhello_tlsext(SSL *s, unsigned char *buf,
unsigned char *limit, int *al)
{
int extdatalen = 0;
unsigned char *orig = buf;
unsigned char *ret = buf;
# ifndef OPENSSL_NO_NEXTPROTONEG
int next_proto_neg_seen;
# endif
# ifndef OPENSSL_NO_... | 74,715,651,731,633,500,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,707 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int ssl_check_clienthello_tlsext_late(SSL *s)
{
int ret = SSL_TLSEXT_ERR_OK;
int al;
/*
* If status request then ask callback what to do. Note: this must be
* called after servername callbacks in case the certificate has changed,
* and must be called after the cipher has been chosen because ... | 24,237,666,672,504,725,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,708 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static void ssl_check_for_safari(SSL *s, const unsigned char *data,
const unsigned char *d, int n)
{
unsigned short type, size;
static const unsigned char kSafariExtensionsBlock[] = {
0x00, 0x0a, /* elliptic_curves extension */
0x00, 0x08, ... | 44,432,635,243,231,860,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,709 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int ssl_check_serverhello_tlsext(SSL *s)
{
int ret = SSL_TLSEXT_ERR_NOACK;
int al = SSL_AD_UNRECOGNIZED_NAME;
# ifndef OPENSSL_NO_EC
/*
* If we are client and using an elliptic curve cryptography cipher
* suite, then if server returns an EC point formats lists extension it
* must contain unc... | 172,903,623,425,694,200,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,710 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static char ssl_next_proto_validate(unsigned char *d, unsigned len)
{
unsigned int off = 0;
while (off < len) {
if (d[off] == 0)
return 0;
off += d[off];
off++;
}
return off == len;
}
| 331,661,344,659,296,280,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,711 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d,
int n)
{
int al = -1;
unsigned char *ptmp = *p;
/*
* Internally supported extensions are parsed first so SNI can be handled
* before custom extensions. An application processing SNI will ... | 114,061,976,855,975,060,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,712 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int ssl_parse_serverhello_tlsext(SSL *s, unsigned char **p, unsigned char *d,
int n)
{
int al = -1;
if (s->version < SSL3_VERSION)
return 1;
if (ssl_scan_serverhello_tlsext(s, p, d, n, &al) <= 0) {
ssl3_send_alert(s, SSL3_AL_FATAL, al);
return 0;
... | 46,082,118,645,860,560,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,713 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int ssl_prepare_clienthello_tlsext(SSL *s)
{
# ifdef TLSEXT_TYPE_opaque_prf_input
{
int r = 1;
if (s->ctx->tlsext_opaque_prf_input_callback != 0) {
r = s->ctx->tlsext_opaque_prf_input_callback(s, NULL, 0,
s->
... | 80,835,252,750,505,470,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,714 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int ssl_prepare_serverhello_tlsext(SSL *s)
{
return 1;
}
| 169,772,840,949,765,600,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,715 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p,
unsigned char *d, int n, int *al)
{
unsigned short type;
unsigned short size;
unsigned short len;
unsigned char *data = *p;
int renegotiate_seen = 0;
s->servername_done = 0;
s->tlsext_st... | 263,359,150,243,377,040,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,716 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int ssl_scan_serverhello_tlsext(SSL *s, unsigned char **p,
unsigned char *d, int n, int *al)
{
unsigned short length;
unsigned short type;
unsigned short size;
unsigned char *data = *p;
int tlsext_servername = 0;
int renegotiate_seen = 0;
# ifndef O... | 168,388,216,354,770,670,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,717 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | void ssl_set_client_disabled(SSL *s)
{
CERT *c = s->cert;
const unsigned char *sigalgs;
size_t i, sigalgslen;
int have_rsa = 0, have_dsa = 0, have_ecdsa = 0;
c->mask_a = 0;
c->mask_k = 0;
/* Don't allow TLS 1.2 only ciphers if we don't suppport them */
if (!SSL_CLIENT_USE_TLS1_2_CIPHERS(... | 191,147,559,843,771,970,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,718 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int tls12_check_peer_sigalg(const EVP_MD **pmd, SSL *s,
const unsigned char *sig, EVP_PKEY *pkey)
{
const unsigned char *sent_sigs;
size_t sent_sigslen, i;
int sigalg = tls12_get_sigid(pkey);
/* Should never happen */
if (sigalg == -1)
return -1;
/* Check key ... | 240,883,915,536,700,450,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,719 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls12_do_shared_sigalgs(TLS_SIGALGS *shsig,
const unsigned char *pref, size_t preflen,
const unsigned char *allow,
size_t allowlen)
{
const unsigned char *ptmp, *atmp;
size_t i, j, nmatch = 0;
... | 143,759,391,134,529,080,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,720 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls12_find_id(int nid, tls12_lookup *table, size_t tlen)
{
size_t i;
for (i = 0; i < tlen; i++) {
if (table[i].nid == nid)
return table[i].id;
}
return -1;
}
| 87,763,670,723,530,740,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,721 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls12_find_nid(int id, tls12_lookup *table, size_t tlen)
{
size_t i;
for (i = 0; i < tlen; i++) {
if ((table[i].id) == id)
return table[i].nid;
}
return NID_undef;
}
| 66,912,507,499,634,350,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,722 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | const EVP_MD *tls12_get_hash(unsigned char hash_alg)
{
switch (hash_alg) {
# ifndef OPENSSL_NO_MD5
case TLSEXT_hash_md5:
# ifdef OPENSSL_FIPS
if (FIPS_mode())
return NULL;
# endif
return EVP_md5();
# endif
# ifndef OPENSSL_NO_SHA
case TLSEXT_hash_sha1:
return EVP_sha1()... | 44,223,442,308,657,110,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,723 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls12_get_pkey_idx(unsigned char sig_alg)
{
switch (sig_alg) {
# ifndef OPENSSL_NO_RSA
case TLSEXT_signature_rsa:
return SSL_PKEY_RSA_SIGN;
# endif
# ifndef OPENSSL_NO_DSA
case TLSEXT_signature_dsa:
return SSL_PKEY_DSA_SIGN;
# endif
# ifndef OPENSSL_NO_ECDSA
case TLSEXT_signat... | 219,022,215,586,066,360,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,724 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | size_t tls12_get_psigalgs(SSL *s, const unsigned char **psigs)
{
/*
* If Suite B mode use Suite B sigalgs only, ignore any other
* preferences.
*/
# ifndef OPENSSL_NO_EC
switch (tls1_suiteb(s)) {
case SSL_CERT_FLAG_SUITEB_128_LOS:
*psigs = suiteb_sigalgs;
return sizeof(suiteb_... | 224,893,236,201,806,070,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,725 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int tls12_get_sigandhash(unsigned char *p, const EVP_PKEY *pk,
const EVP_MD *md)
{
int sig_id, md_id;
if (!md)
return 0;
md_id = tls12_find_id(EVP_MD_type(md), tls12_md,
sizeof(tls12_md) / sizeof(tls12_lookup));
if (md_id == -1)
return 0... | 119,498,925,022,774,930,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,726 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int tls12_get_sigid(const EVP_PKEY *pk)
{
return tls12_find_id(pk->type, tls12_sig,
sizeof(tls12_sig) / sizeof(tls12_lookup));
}
| 33,422,989,494,448,110,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,727 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls1_alpn_handle_client_hello(SSL *s, const unsigned char *data,
unsigned data_len, int *al)
{
unsigned i;
unsigned proto_len;
const unsigned char *selected;
unsigned char selected_len;
int r;
if (s->ctx->alpn_select_cb == NULL)
return... | 158,386,071,440,356,590,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,728 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls1_check_cert_param(SSL *s, X509 *x, int set_ee_md)
{
unsigned char comp_id, curve_id[2];
EVP_PKEY *pkey;
int rv;
pkey = X509_get_pubkey(x);
if (!pkey)
return 0;
/* If not EC nothing to do */
if (pkey->type != EVP_PKEY_EC) {
EVP_PKEY_free(pkey);
return 1;... | 288,858,778,690,432,720,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,729 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain,
int idx)
{
int i;
int rv = 0;
int check_flags = 0, strict_mode;
CERT_PKEY *cpk = NULL;
CERT *c = s->cert;
unsigned int suiteb_flags = tls1_suiteb(s);
/* idx == -1 means checking server chains */
... | 161,309,854,715,343,400,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,730 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int tls1_check_curve(SSL *s, const unsigned char *p, size_t len)
{
const unsigned char *curves;
size_t num_curves, i;
unsigned int suiteb_flags = tls1_suiteb(s);
if (len != 3 || p[0] != NAMED_CURVE_TYPE)
return 0;
/* Check curve matches Suite B preferences */
if (suiteb_flags) {
... | 94,841,621,028,955,290,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,731 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls1_check_ec_key(SSL *s,
unsigned char *curve_id, unsigned char *comp_id)
{
const unsigned char *pformats, *pcurves;
size_t num_formats, num_curves, i;
int j;
/*
* If point formats extension present check it, otherwise everything is
* supported (see RFC... | 307,142,355,006,259,700,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,732 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | int tls1_check_ec_tmp_key(SSL *s, unsigned long cid)
{
unsigned char curve_id[2];
EC_KEY *ec = s->cert->ecdh_tmp;
# ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL
/* Allow any curve: not just those peer supports */
if (s->cert->cert_flags & SSL_CERT_FLAG_BROKEN_PROTOCOL)
return 1;
# endif
/*
... | 302,692,041,637,633,330,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,733 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | static int tls1_check_sig_alg(CERT *c, X509 *x, int default_nid)
{
int sig_nid;
size_t i;
if (default_nid == -1)
return 1;
sig_nid = X509_get_signature_nid(x);
if (default_nid)
return sig_nid == default_nid ? 1 : 0;
for (i = 0; i < c->shared_sigalgslen; i++)
if (sig_nid =... | 32,053,776,732,287,635,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,734 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | void tls1_clear(SSL *s)
{
ssl3_clear(s);
s->version = s->method->version;
}
| 46,206,712,764,112,000,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
14,735 | openssl | 76343947ada960b6269090638f5391068daee88d | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d | Fix for CVE-2015-0291
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org>
Conflicts:
ssl/t1_lib.c | 0 | long tls1_default_timeout(void)
{
/*
* 2 hours, the 24 hours mentioned in the TLSv1 spec is way too long for
* http, the cache would over fill
*/
return (60 * 60 * 2);
}
| 187,499,077,505,499,420,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2015-0291 | The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. | https://nvd.nist.gov/vuln/detail/CVE-2015-0291 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.