idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
14,560
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
static void gx_ttfReader__ReleaseGlyph(ttfReader *self, int glyph_index) { gx_ttfReader *r = (gx_ttfReader *)self; if (r->extra_glyph_index != glyph_index) return; r->extra_glyph_index = -1; gs_glyph_data_free(&r->glyph_data, "gx_ttfReader__ReleaseExtraGlyph"); }
142,530,177,083,497,440,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,561
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
static void gx_ttfReader__Reset(gx_ttfReader *self) { if (self->extra_glyph_index != -1) { self->extra_glyph_index = -1; gs_glyph_data_free(&self->glyph_data, "gx_ttfReader__Reset"); } self->error = false; self->pos = 0; }
168,409,078,251,237,240,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,562
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
static void gx_ttfReader__Seek(ttfReader *self, int nPos) { gx_ttfReader *r = (gx_ttfReader *)self; r->pos = nPos; }
27,149,157,762,356,127,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,563
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
static int gx_ttfReader__Tell(ttfReader *self) { gx_ttfReader *r = (gx_ttfReader *)self; return r->pos; }
240,267,415,861,986,270,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,564
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
gx_ttfReader *gx_ttfReader__create(gs_memory_t *mem) { gx_ttfReader *r = gs_alloc_struct(mem, gx_ttfReader, &st_gx_ttfReader, "gx_ttfReader__create"); if (r != NULL) { r->super.Eof = gx_ttfReader__Eof; r->super.Read = gx_ttfReader__Read; r->super.Seek = gx_ttfReader__Seek; r->su...
26,142,844,088,108,183,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,565
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
gx_ttfReader__default_get_metrics(const ttfReader *ttf, uint glyph_index, bool bVertical, short *sideBearing, unsigned short *nAdvance) { gx_ttfReader *self = (gx_ttfReader *)ttf; float sbw[4]; int sbw_offset = bVertical; int code; int factor = self->pfont->data.uni...
331,009,124,007,626,770,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,566
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
void gx_ttfReader__destroy(gx_ttfReader *self) { gs_free_object(self->memory, self, "gx_ttfReader__destroy"); }
79,593,293,578,172,860,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,567
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
void gx_ttfReader__set_font(gx_ttfReader *self, gs_font_type42 *pfont) { self->pfont = pfont; self->super.get_metrics = gx_ttfReader__default_get_metrics; }
158,584,095,502,809,720,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,568
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
int gx_ttf_outline(ttfFont *ttf, gx_ttfReader *r, gs_font_type42 *pfont, int glyph_index, const gs_matrix *m, const gs_log2_scale_point *pscale, gx_path *path, bool design_grid) { gx_ttfExport e; ttfOutliner o; gs_point char_size, subpix_origin; gs_matrix post_transform; /* Ghostscri...
237,044,278,301,657,830,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,569
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
path_to_hinter(t1_hinter *h, gx_path *path) { int code; gs_path_enum penum; gs_fixed_point pts[3]; gs_fixed_point p = {0, 0}; /* initialize to avoid a warning */ bool first = true; int op; code = gx_path_enum_init(&penum, path); if (code < 0) return code; while ((op = gx_path_...
237,025,439,611,789,020,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,570
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
static inline float reminder(float v, int x) { return ((v / x) - floor(v / x)) * x; }
276,790,090,165,000,270,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,571
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
stem_hint_handler(void *client_data, gx_san_sect *ss) { t1_hinter_aux *h = (t1_hinter_aux *)client_data; if (ss->side_mask == 3) { /* Orient horizontal hints to help with top/bottom alignment zones. Otherwize glyphs may get a random height due to serif adjustsment. */ if (ss->xl > h-...
257,960,629,922,763,300,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,572
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
transpose_path(gx_path *path) { segment *s = (segment *)path->first_subpath; exch(path->bbox.p.x, path->bbox.p.y); exch(path->bbox.q.x, path->bbox.q.y); for (; s; s = s->next) { if (s->type == s_curve) { curve_segment *c = (curve_segment *)s; exch(c->p1.x, c->p1.y); ...
99,219,387,815,683,360,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,573
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
int ttfFont__Open_aux(ttfFont *self, ttfInterpreter *tti, gx_ttfReader *r, gs_font_type42 *pfont, const gs_matrix * char_tm, const gs_log2_scale_point *log2_scale, bool design_grid) { gs_point char_size, subpix_origin; gs_matrix post_transform; /* * Ghostscript proceses a ...
232,071,823,989,148,600,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,574
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
ttfFont *ttfFont__create(gs_font_dir *dir) { gs_memory_t *mem = dir->memory->stable_memory; ttfFont *ttf; if (dir->ttm == NULL) { gx_ttfMemory *m = gs_alloc_struct(mem, gx_ttfMemory, &st_gx_ttfMemory, "ttfFont__create(gx_ttfMemory)"); if (!m) return 0; m->super.alloc_st...
45,444,119,192,505,800,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,575
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
None
0
void ttfFont__destroy(ttfFont *self, gs_font_dir *dir) { gs_memory_t *mem = dir->memory->stable_memory; ttfFont__finit(self); gs_free_object(mem, self, "ttfFont__destroy"); ttfInterpreter__release(&dir->tti); gx_san__release(&dir->san); if (dir->tti == NULL && dir->ttm != NULL) { gs_fre...
152,858,058,194,790,560,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
14,576
ghostscript
7755e67116e8973ee0e3b22d653df026a84fa01b
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=7755e67116e8973ee0e3b22d653df026a84fa01b
None
0
static void Ins_JMPR( INS_ARG ) { CUR.IP += (Int)(args[0]); CUR.step_ins = FALSE; if(CUR.IP > CUR.codeSize || (CUR.code[CUR.IP] != 0x2D && CUR.code[CUR.IP - 1] == 0x2D)) /* The JPMR is meant to stop at the ENDF instruction to finish * the function. However the programmer made a mi...
172,485,663,840,957,000,000,000,000,000,000,000,000
ttinterp.c
139,966,561,060,943,070,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9726
The Ins_MDRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9726
14,577
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
dbus_g_proxy_manager_get (DBusConnection *connection) { DBusGProxyManager *manager; dbus_connection_allocate_data_slot (&g_proxy_manager_slot); if (g_proxy_manager_slot < 0) g_error ("out of memory"); g_static_mutex_lock (&connection_g_proxy_lock); manager = dbus_connection_get_data (connection, g_...
225,560,774,701,777,500,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,578
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
dbus_g_proxy_manager_list_all (DBusGProxyManager *manager) { GSList *ret; ret = NULL; if (manager->proxy_lists) { g_hash_table_foreach (manager->proxy_lists, list_proxies_foreach, &ret); } return ret; }
294,433,032,915,279,600,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,579
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
dbus_g_proxy_manager_monitor_name_owner (DBusGProxyManager *manager, const char *owner, const char *name) { GSList *names; GSList *link; DBusGProxyNameOwnerInfo *nameinfo; names = g_hash_table_lookup (manager->owner_names, owner); link = g_slist_find_custom (names, name, find_nam...
119,817,645,860,837,620,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,580
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
dbus_g_proxy_manager_register (DBusGProxyManager *manager, DBusGProxy *proxy) { DBusGProxyList *list; DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(proxy); LOCK_MANAGER (manager); if (manager->proxy_lists == NULL) { g_assert (manager->owner_names == NULL); ...
62,928,892,076,989,150,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,581
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
dbus_g_proxy_manager_unmonitor_name_owner (DBusGProxyManager *manager, const char *name) { DBusGProxyNameOwnerInfo *info; const char *owner; gboolean ret; ret = dbus_g_proxy_manager_lookup_name_owner (manager, name, &info, &owner); g_assert (ret); g_assert (info != NULL); g_assert (owner...
163,206,738,219,330,900,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,582
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
dbus_g_proxy_manager_unref (DBusGProxyManager *manager) { g_assert (manager != NULL); g_assert (manager->refcount > 0); LOCK_MANAGER (manager); manager->refcount -= 1; if (manager->refcount == 0) { UNLOCK_MANAGER (manager); if (manager->bus_proxy) g_object_unref (manager->bus_proxy); ...
207,467,680,141,901,940,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,583
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
g_proxy_get_signal_match_rule (DBusGProxy *proxy) { DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(proxy); /* FIXME Escaping is required here */ if (priv->name) return g_strdup_printf ("type='signal',sender='%s',path='%s',interface='%s'", priv->name, priv->path, priv->interf...
158,833,670,863,399,330,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,584
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
g_proxy_list_free (DBusGProxyList *list) { /* we don't hold a reference to the proxies in the list, * as they ref the GProxyManager */ g_slist_free (list->proxies); g_free (list); }
28,012,246,611,522,945,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,585
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
g_proxy_list_new (DBusGProxy *first_proxy) { DBusGProxyList *list; DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(first_proxy); list = (void*) tristring_alloc_from_strings (G_STRUCT_OFFSET (DBusGProxyList, name), priv->name, ...
36,878,693,601,044,867,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,586
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
get_name_owner (DBusConnection *connection, const char *name, GError **error) { DBusError derror; DBusMessage *request, *reply; char *base_name; dbus_error_init (&derror); base_name = NULL; reply = NULL; request = dbus_message_new_method_call (DBUS_SERVICE_DBUS, DBUS...
126,741,529,555,146,870,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,587
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
get_owner_match_rule (const gchar *name) { return g_strdup_printf ("type='signal',sender='" DBUS_SERVICE_DBUS "',path='" DBUS_PATH_DBUS "',interface='" DBUS_INTERFACE_DBUS "',member='NameOwnerChanged'" ",arg0='%s'", name); }
241,519,473,028,672,750,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,588
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
guint_slice_free (gpointer data) { g_slice_free (guint, data); }
69,286,086,374,882,740,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,589
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
insert_nameinfo (DBusGProxyManager *manager, const char *owner, DBusGProxyNameOwnerInfo *info) { GSList *names; gboolean insert; names = g_hash_table_lookup (manager->owner_names, owner); /* Only need to g_hash_table_insert the first time */ insert = (names == NULL); names = g_sl...
5,819,691,621,943,157,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,590
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
list_proxies_foreach (gpointer key, gpointer value, gpointer user_data) { DBusGProxyList *list; GSList **ret; GSList *tmp; list = value; ret = user_data; tmp = list->proxies; while (tmp != NULL) { DBusGProxy *proxy = DBUS_G_PROXY (tmp->data); ...
115,993,788,488,815,860,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,591
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
oom (void) { g_error ("no memory"); }
71,607,166,891,539,840,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,592
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
strequal_len (const char *a, const char *b, size_t *lenp) { size_t a_len; size_t b_len; a_len = strlen (a); b_len = strlen (b); if (a_len != b_len) return FALSE; if (memcmp (a, b, a_len) != 0) return FALSE; *lenp = a_len; return TRUE; }
86,659,313,762,811,930,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,593
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
tristring_alloc_from_strings (size_t padding_before, const char *name, const char *path, const char *interface) { size_t name_len, iface_len, path_len, len; char *tri; if (name) name_len = strlen (name); else ...
302,959,749,261,637,830,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,594
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
tristring_equal (gconstpointer a, gconstpointer b) { const char *ap = a; const char *bp = b; size_t len; if (!strequal_len (ap, bp, &len)) return FALSE; ap += len + 1; bp += len + 1; if (!strequal_len (ap, bp, &len)) return FALSE; ap += len + 1; bp += len + 1; if (str...
149,912,757,392,685,380,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,595
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
tristring_from_message (DBusMessage *message) { const char *path; const char *interface; path = dbus_message_get_path (message); interface = dbus_message_get_interface (message); g_assert (path); g_assert (interface); return tristring_alloc_from_strings (0, dbus...
142,296,002,982,204,580,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,596
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
tristring_from_proxy (DBusGProxy *proxy) { DBusGProxyPrivate *priv = DBUS_G_PROXY_GET_PRIVATE(proxy); return tristring_alloc_from_strings (0, priv->name, priv->path, priv->interface); }
90,709,961,877,578,520,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,597
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
tristring_hash (gconstpointer key) { const char *p = key; guint h = *p; if (h) { for (p += 1; *p != '\0'; p++) h = (h << 5) - h + *p; } /* skip nul and do the next substring */ for (p += 1; *p != '\0'; p++) h = (h << 5) - h + *p; /* skip nul again and another substring */ for ...
198,528,371,901,889,730,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,598
dbus
166978a09cf5edff4028e670b6074215a4c75eca
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca
None
0
unassociate_proxies (gpointer key, gpointer val, gpointer user_data) { DBusGProxyList *list; const char *name; GSList *tmp; DBusGProxyUnassociateData *data; list = val; data = user_data; name = data->name; for (tmp = list->proxies; tmp; tmp = tmp->next) { DBusGProxy *proxy = DBUS_G_PROXY (...
119,892,305,891,147,540,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0292
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
https://nvd.nist.gov/vuln/detail/CVE-2013-0292
14,609
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323
None
0
static inline int u16(const byte *p) { return (p[0] << 8) | p[1]; }
240,012,338,865,354,150,000,000,000,000,000,000,000
xpsttf.c
107,102,883,587,469,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9619
The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9619
14,610
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323
None
0
static inline int u32(const byte *p) { return (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3]; }
335,515,854,641,345,100,000,000,000,000,000,000,000
xpsttf.c
107,102,883,587,469,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9619
The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9619
14,611
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323
None
0
xps_true_callback_decode_glyph(gs_font *pfont, gs_glyph glyph, int ch, ushort *unicode_return, unsigned int length) { xps_font_t *font = pfont->client_data; char *ur = (char *)unicode_return; int u; if (length == 0) return 2; u = xps_decode_font_char(font, glyph); /* Unfortunate assumpt...
135,448,517,279,392,320,000,000,000,000,000,000,000
xpsttf.c
107,102,883,587,469,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9619
The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9619
14,612
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323
None
0
xps_true_callback_encode_char(gs_font *pfont, gs_char chr, gs_glyph_space_t spc) { xps_font_t *font = pfont->client_data; int value; value = xps_encode_font_char(font, chr); if (value == 0) return GS_NO_GLYPH; return value; }
55,780,569,689,528,290,000,000,000,000,000,000,000
xpsttf.c
107,102,883,587,469,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9619
The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9619
14,613
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323
None
0
xps_true_callback_string_proc(gs_font_type42 *p42, ulong offset, uint length, const byte **pdata) { xps_font_t *font = p42->client_data; if (offset + length > font->length) { *pdata = NULL; return gs_throw2(-1, "font data access out of bounds (offset=%lu size=%u)", offset, length); } ...
21,344,698,573,276,280,000,000,000,000,000,000,000
xpsttf.c
107,102,883,587,469,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9619
The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9619
14,614
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323
None
0
xps_true_get_glyph_index(gs_font_type42 *pfont42, gs_glyph glyph) { /* identity */ return glyph; }
32,362,511,392,423,934,000,000,000,000,000,000,000
xpsttf.c
107,102,883,587,469,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9619
The xps_true_callback_glyph_name function in xps/xpsttf.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (Segmentation Violation and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9619
14,615
ghostscript
3c2aebbedd37fab054e80f2e315de07d7e9b5bdb
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3c2aebbedd37fab054e80f2e315de07d7e9b5bdb
None
0
xps_true_callback_glyph_name(gs_font *pfont, gs_glyph glyph, gs_const_string *pstr) { /* This function is copied verbatim from plfont.c */ int table_length; int table_offset; ulong format; int numGlyphs; uint glyph_name_index; const byte *postp; /* post table pointer */ if (glyph >= G...
44,989,565,693,314,160,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-9618
The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9618
14,616
ghostscript
c7c55972758a93350882c32147801a3485b010fe
http://git.ghostscript.com/?p=mupdf
None
None
0
static void Ins_MDRP( INS_ARG ) { Int point; TT_F26Dot6 distance, org_dist; point = (Int)args[0]; if ( BOUNDS( args[0], CUR.zp1.n_points ) ) { /* Current version of FreeType silently ignores this out of bounds error * and drops the instruction, see bu...
167,825,600,788,309,180,000,000,000,000,000,000,000
ttinterp.c
236,068,805,462,462,100,000,000,000,000,000,000,000
[]
None
None
https://nvd.nist.gov/vuln/detail/None
14,617
ghostscript
d2ab84732936b6e7e5a461dc94344902965e9a06
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06
None
0
xps_decode_font_char(xps_font_t *font, int code) { int gid = xps_decode_font_char_imp(font, code); if (gid == 0) return code; return gid; }
217,163,101,298,483,200,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9610
The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9610
14,618
ghostscript
d2ab84732936b6e7e5a461dc94344902965e9a06
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06
None
0
xps_decode_font_char_imp(xps_font_t *font, int code) { byte *table; /* no cmap selected: return identity */ if (font->cmapsubtable <= 0) return code; table = font->data + font->cmapsubtable; switch (u16(table)) { case 0: /* Apple standard 1-to-1 mapping. */ { ...
332,930,374,465,803,460,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9610
The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9610
14,619
ghostscript
d2ab84732936b6e7e5a461dc94344902965e9a06
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06
None
0
xps_encode_font_char_imp(xps_font_t *font, int code) { byte *table; /* no cmap selected: return identity */ if (font->cmapsubtable <= 0) return code; table = font->data + font->cmapsubtable; switch (u16(table)) { case 0: /* Apple standard 1-to-1 mapping. */ return table[co...
184,464,050,977,881,200,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9610
The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9610
14,620
ghostscript
d2ab84732936b6e7e5a461dc94344902965e9a06
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d2ab84732936b6e7e5a461dc94344902965e9a06
None
0
xps_measure_font_glyph(xps_context_t *ctx, xps_font_t *font, int gid, xps_glyph_metrics_t *mtx) { int head, format, loca, glyf; int ofs, len; int idx, i, n; int hadv, vadv, vorg; int vtop, ymax, desc; int scale; /* some insane defaults */ scale = 1000; /* units-per-em */ hadv = 50...
105,315,959,507,302,620,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9610
The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9610
14,621
altlinux
ffe7058c70253d574b1963c7c93002bd410fddc9
http://git.altlinux.org/people/ldv/packages/?p=pam
http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9
None
0
cleanup (pam_handle_t *pamh UNUSED, void *data, int err UNUSED) { free (data); }
33,007,043,247,723,163,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2010-4707
The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.
https://nvd.nist.gov/vuln/detail/CVE-2010-4707
14,622
altlinux
ffe7058c70253d574b1963c7c93002bd410fddc9
http://git.altlinux.org/people/ldv/packages/?p=pam
http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9
None
0
pam_sm_open_session (pam_handle_t *pamh, int flags UNUSED, int argc, const char **argv) { char *cookiefile = NULL, *xauthority = NULL, *cookie = NULL, *display = NULL, *tmp = NULL, *xauthlocalhostname = NULL; const char *user, *xauth = NULL; struct passwd *tpwd, *rpwd; int fd, i, debug = 0; int ...
161,819,098,500,340,000,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2010-4707
The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.
https://nvd.nist.gov/vuln/detail/CVE-2010-4707
14,623
altlinux
ffe7058c70253d574b1963c7c93002bd410fddc9
http://git.altlinux.org/people/ldv/packages/?p=pam
http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9
None
0
run_coprocess(pam_handle_t *pamh, const char *input, char **output, uid_t uid, gid_t gid, const char *command, ...) { int ipipe[2], opipe[2], i; char buf[LINE_MAX]; pid_t child; char *buffer = NULL; size_t buffer_size = 0; va_list ap; *output = NULL; /* Create stdio pipery. */ if (pipe(ipipe) == -1) {...
335,965,787,766,231,970,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2010-4707
The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.
https://nvd.nist.gov/vuln/detail/CVE-2010-4707
14,624
altlinux
05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123
http://git.altlinux.org/people/ldv/packages/?p=pam
http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123
None
0
check_acl(pam_handle_t *pamh, const char *sense, const char *this_user, const char *other_user, int noent_code, int debug) { char path[PATH_MAX]; struct passwd *pwd; FILE *fp = NULL; int i, fd = -1, save_errno; uid_t fsuid; struct stat st; /* Check this user's <sense> file. */ pwd = pam_modutil_getpwnam(p...
103,683,347,779,132,160,000,000,000,000,000,000,000
None
null
[]
CVE-2010-4706
The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.
https://nvd.nist.gov/vuln/detail/CVE-2010-4706
14,632
openssl
66e8211c0b1347970096e04b18aa52567c325200
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=66e8211c0b1347970096e04b18aa52567c325200
Don't try and verify signatures if key is NULL (CVE-2013-0166) Add additional check to catch this in ASN1_item_verify too.
0
int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey) { EVP_MD_CTX ctx; const EVP_MD *type; unsigned char *p,*buf_in=NULL; int ret= -1,i,inl; EVP_MD_CTX_init(&ctx); i=OBJ_obj2nid(a->algorithm); type=EVP_get_digestbyname(OBJ_nid2sn(i)); if (type == NULL) {...
65,746,564,338,361,610,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0166
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
https://nvd.nist.gov/vuln/detail/CVE-2013-0166
14,633
openssl
ebc71865f0506a293242bd4aec97cdc7a8ef24b0
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ebc71865f0506a293242bd4aec97cdc7a8ef24b0
Don't try and verify signatures if key is NULL (CVE-2013-0166) Add additional check to catch this in ASN1_item_verify too.
0
int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey) { EVP_MD_CTX ctx; const EVP_MD *type; unsigned char *p,*buf_in=NULL; int ret= -1,i,inl; EVP_MD_CTX_init(&ctx); i=OBJ_obj2nid(a->algorithm); type=EVP_get_digestbyname(OBJ_nid2sn(i)); if (type == NULL) {...
226,146,486,295,836,600,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0166
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
https://nvd.nist.gov/vuln/detail/CVE-2013-0166
14,634
samba
10c3e3923022485c720f322ca4f0aca5d7501310
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
0
void change_file_owner_to_parent(connection_struct *conn, const char *inherit_from_dir, files_struct *fsp) { struct smb_filename *smb_fname_parent; int ret; smb_fname_parent = synthetic_smb_fname(talloc_tos(), inherit_from_dir, NULL, NULL, 0); if (smb_fname_parent == NULL) { return;...
110,677,895,137,802,780,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2017-9461
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
https://nvd.nist.gov/vuln/detail/CVE-2017-9461
14,635
samba
10c3e3923022485c720f322ca4f0aca5d7501310
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
0
static NTSTATUS check_base_file_access(struct connection_struct *conn, struct smb_filename *smb_fname, uint32_t access_mask) { NTSTATUS status; status = smbd_calculate_access_mask(conn, smb_fname, false, access_mask, &access_mask); if (!NT_STATUS_IS_OK(status)) { DEBUG(10, ("smbd_calculate_...
18,273,853,255,462,540,000,000,000,000,000,000,000
open.c
59,822,861,259,288,750,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-9461
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
https://nvd.nist.gov/vuln/detail/CVE-2017-9461
14,636
samba
10c3e3923022485c720f322ca4f0aca5d7501310
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
0
NTSTATUS check_parent_access(struct connection_struct *conn, struct smb_filename *smb_fname, uint32_t access_mask) { NTSTATUS status; char *parent_dir = NULL; struct security_descriptor *parent_sd = NULL; uint32_t access_granted = 0; struct smb_filename *parent_smb_fname = NULL; if (!parent_dirname(tallo...
229,511,403,409,907,970,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2017-9461
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
https://nvd.nist.gov/vuln/detail/CVE-2017-9461
14,637
samba
10c3e3923022485c720f322ca4f0aca5d7501310
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
0
NTSTATUS fd_close(files_struct *fsp) { int ret; if (fsp->dptr) { dptr_CloseDir(fsp); } if (fsp->fh->fd == -1) { return NT_STATUS_OK; /* What we used to call a stat open. */ } if (fsp->fh->ref_count > 1) { return NT_STATUS_OK; /* Shared handle. Only close last reference. */ } ret = SMB_VFS_CLOSE(fsp); f...
245,100,943,223,612,500,000,000,000,000,000,000,000
open.c
59,822,861,259,288,750,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-9461
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
https://nvd.nist.gov/vuln/detail/CVE-2017-9461
14,638
samba
10c3e3923022485c720f322ca4f0aca5d7501310
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
0
NTSTATUS fd_open(struct connection_struct *conn, files_struct *fsp, int flags, mode_t mode) { struct smb_filename *smb_fname = fsp->fsp_name; NTSTATUS status = NT_STATUS_OK; #ifdef O_NOFOLLOW /* * Never follow symlinks on a POSIX client. The * client should be doing this. */ if ((fsp->posix_flags ...
103,231,122,520,810,960,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2017-9461
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
https://nvd.nist.gov/vuln/detail/CVE-2017-9461
14,639
samba
10c3e3923022485c720f322ca4f0aca5d7501310
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
0
static bool parent_override_delete(connection_struct *conn, const struct smb_filename *smb_fname, uint32_t access_mask, uint32_t rejected_mask) { if ((access_mask & DELETE_ACCESS) && (rejected_mask & DELETE_ACCESS) && can_delete_file_in_directory(conn, smb_fname)) { return true; } return...
40,914,486,067,641,863,000,000,000,000,000,000,000
open.c
59,822,861,259,288,750,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-9461
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
https://nvd.nist.gov/vuln/detail/CVE-2017-9461
14,640
samba
10c3e3923022485c720f322ca4f0aca5d7501310
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
0
NTSTATUS smbd_check_access_rights(struct connection_struct *conn, const struct smb_filename *smb_fname, bool use_privs, uint32_t access_mask) { /* Check if we have rights to open. */ NTSTATUS status; struct security_descriptor *sd = NULL; uint32_t rejected_share_access; uint32_t rejected_mask = access_...
280,604,910,114,723,800,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2017-9461
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
https://nvd.nist.gov/vuln/detail/CVE-2017-9461
14,700
openssl
d0666f289ac013094bbbf547bfbcd616199b7d2d
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d0666f289ac013094bbbf547bfbcd616199b7d2d
evp: prevent underflow in base64 decoding This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
0
void EVP_DecodeInit(EVP_ENCODE_CTX *ctx) { ctx->length=30; ctx->num=0; ctx->line_num=0; ctx->expect_nl=0; }
262,736,147,000,663,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-0292
Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 da...
https://nvd.nist.gov/vuln/detail/CVE-2015-0292
14,701
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain) { return tls1_check_chain(s, x, pk, chain, -1); }
202,870,273,123,534,900,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,702
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int SSL_get_shared_sigalgs(SSL *s, int idx, int *psign, int *phash, int *psignhash, unsigned char *rsig, unsigned char *rhash) { TLS_SIGALGS *shsigalgs = s->cert->shared_sigalgs; if (!shsigalgs || idx >= (int)s->cert->shared_sigalgslen) return 0; ...
141,238,580,166,260,330,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,703
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int SSL_get_sigalgs(SSL *s, int idx, int *psign, int *phash, int *psignhash, unsigned char *rsig, unsigned char *rhash) { const unsigned char *psig = s->cert->peer_sigalgs; if (psig == NULL) return 0; if (idx >= 0) { idx <<= 1; if (idx >= (int)...
239,009,021,814,542,300,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,704
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int sig_cb(const char *elem, int len, void *arg) { sig_cb_st *sarg = arg; size_t i; char etmp[20], *p; int sig_alg, hash_alg; if (elem == NULL) return 0; if (sarg->sigalgcnt == MAX_SIGALGLEN) return 0; if (len > (int)(sizeof(etmp) - 1)) return 0; memcpy(etm...
69,700,957,621,570,980,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,705
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit, int *al) { int extdatalen = 0; unsigned char *orig = buf; unsigned char *ret = buf; # ifndef OPENSSL_NO_EC /* See if we support any ECC ciphersuites */ int using_ecc ...
267,878,755,159,607,580,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,706
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
unsigned char *ssl_add_serverhello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit, int *al) { int extdatalen = 0; unsigned char *orig = buf; unsigned char *ret = buf; # ifndef OPENSSL_NO_NEXTPROTONEG int next_proto_neg_seen; # endif # ifndef OPENSSL_NO_...
74,715,651,731,633,500,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,707
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int ssl_check_clienthello_tlsext_late(SSL *s) { int ret = SSL_TLSEXT_ERR_OK; int al; /* * If status request then ask callback what to do. Note: this must be * called after servername callbacks in case the certificate has changed, * and must be called after the cipher has been chosen because ...
24,237,666,672,504,725,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,708
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsigned char *d, int n) { unsigned short type, size; static const unsigned char kSafariExtensionsBlock[] = { 0x00, 0x0a, /* elliptic_curves extension */ 0x00, 0x08, ...
44,432,635,243,231,860,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,709
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int ssl_check_serverhello_tlsext(SSL *s) { int ret = SSL_TLSEXT_ERR_NOACK; int al = SSL_AD_UNRECOGNIZED_NAME; # ifndef OPENSSL_NO_EC /* * If we are client and using an elliptic curve cryptography cipher * suite, then if server returns an EC point formats lists extension it * must contain unc...
172,903,623,425,694,200,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,710
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static char ssl_next_proto_validate(unsigned char *d, unsigned len) { unsigned int off = 0; while (off < len) { if (d[off] == 0) return 0; off += d[off]; off++; } return off == len; }
331,661,344,659,296,280,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,711
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n) { int al = -1; unsigned char *ptmp = *p; /* * Internally supported extensions are parsed first so SNI can be handled * before custom extensions. An application processing SNI will ...
114,061,976,855,975,060,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,712
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int ssl_parse_serverhello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n) { int al = -1; if (s->version < SSL3_VERSION) return 1; if (ssl_scan_serverhello_tlsext(s, p, d, n, &al) <= 0) { ssl3_send_alert(s, SSL3_AL_FATAL, al); return 0; ...
46,082,118,645,860,560,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,713
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int ssl_prepare_clienthello_tlsext(SSL *s) { # ifdef TLSEXT_TYPE_opaque_prf_input { int r = 1; if (s->ctx->tlsext_opaque_prf_input_callback != 0) { r = s->ctx->tlsext_opaque_prf_input_callback(s, NULL, 0, s-> ...
80,835,252,750,505,470,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,714
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int ssl_prepare_serverhello_tlsext(SSL *s) { return 1; }
169,772,840,949,765,600,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,715
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) { unsigned short type; unsigned short size; unsigned short len; unsigned char *data = *p; int renegotiate_seen = 0; s->servername_done = 0; s->tlsext_st...
263,359,150,243,377,040,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,716
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int ssl_scan_serverhello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) { unsigned short length; unsigned short type; unsigned short size; unsigned char *data = *p; int tlsext_servername = 0; int renegotiate_seen = 0; # ifndef O...
168,388,216,354,770,670,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,717
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
void ssl_set_client_disabled(SSL *s) { CERT *c = s->cert; const unsigned char *sigalgs; size_t i, sigalgslen; int have_rsa = 0, have_dsa = 0, have_ecdsa = 0; c->mask_a = 0; c->mask_k = 0; /* Don't allow TLS 1.2 only ciphers if we don't suppport them */ if (!SSL_CLIENT_USE_TLS1_2_CIPHERS(...
191,147,559,843,771,970,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,718
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int tls12_check_peer_sigalg(const EVP_MD **pmd, SSL *s, const unsigned char *sig, EVP_PKEY *pkey) { const unsigned char *sent_sigs; size_t sent_sigslen, i; int sigalg = tls12_get_sigid(pkey); /* Should never happen */ if (sigalg == -1) return -1; /* Check key ...
240,883,915,536,700,450,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,719
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls12_do_shared_sigalgs(TLS_SIGALGS *shsig, const unsigned char *pref, size_t preflen, const unsigned char *allow, size_t allowlen) { const unsigned char *ptmp, *atmp; size_t i, j, nmatch = 0; ...
143,759,391,134,529,080,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,720
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls12_find_id(int nid, tls12_lookup *table, size_t tlen) { size_t i; for (i = 0; i < tlen; i++) { if (table[i].nid == nid) return table[i].id; } return -1; }
87,763,670,723,530,740,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,721
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls12_find_nid(int id, tls12_lookup *table, size_t tlen) { size_t i; for (i = 0; i < tlen; i++) { if ((table[i].id) == id) return table[i].nid; } return NID_undef; }
66,912,507,499,634,350,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,722
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
const EVP_MD *tls12_get_hash(unsigned char hash_alg) { switch (hash_alg) { # ifndef OPENSSL_NO_MD5 case TLSEXT_hash_md5: # ifdef OPENSSL_FIPS if (FIPS_mode()) return NULL; # endif return EVP_md5(); # endif # ifndef OPENSSL_NO_SHA case TLSEXT_hash_sha1: return EVP_sha1()...
44,223,442,308,657,110,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,723
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls12_get_pkey_idx(unsigned char sig_alg) { switch (sig_alg) { # ifndef OPENSSL_NO_RSA case TLSEXT_signature_rsa: return SSL_PKEY_RSA_SIGN; # endif # ifndef OPENSSL_NO_DSA case TLSEXT_signature_dsa: return SSL_PKEY_DSA_SIGN; # endif # ifndef OPENSSL_NO_ECDSA case TLSEXT_signat...
219,022,215,586,066,360,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,724
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
size_t tls12_get_psigalgs(SSL *s, const unsigned char **psigs) { /* * If Suite B mode use Suite B sigalgs only, ignore any other * preferences. */ # ifndef OPENSSL_NO_EC switch (tls1_suiteb(s)) { case SSL_CERT_FLAG_SUITEB_128_LOS: *psigs = suiteb_sigalgs; return sizeof(suiteb_...
224,893,236,201,806,070,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,725
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int tls12_get_sigandhash(unsigned char *p, const EVP_PKEY *pk, const EVP_MD *md) { int sig_id, md_id; if (!md) return 0; md_id = tls12_find_id(EVP_MD_type(md), tls12_md, sizeof(tls12_md) / sizeof(tls12_lookup)); if (md_id == -1) return 0...
119,498,925,022,774,930,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,726
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int tls12_get_sigid(const EVP_PKEY *pk) { return tls12_find_id(pk->type, tls12_sig, sizeof(tls12_sig) / sizeof(tls12_lookup)); }
33,422,989,494,448,110,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,727
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls1_alpn_handle_client_hello(SSL *s, const unsigned char *data, unsigned data_len, int *al) { unsigned i; unsigned proto_len; const unsigned char *selected; unsigned char selected_len; int r; if (s->ctx->alpn_select_cb == NULL) return...
158,386,071,440,356,590,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,728
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls1_check_cert_param(SSL *s, X509 *x, int set_ee_md) { unsigned char comp_id, curve_id[2]; EVP_PKEY *pkey; int rv; pkey = X509_get_pubkey(x); if (!pkey) return 0; /* If not EC nothing to do */ if (pkey->type != EVP_PKEY_EC) { EVP_PKEY_free(pkey); return 1;...
288,858,778,690,432,720,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,729
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain, int idx) { int i; int rv = 0; int check_flags = 0, strict_mode; CERT_PKEY *cpk = NULL; CERT *c = s->cert; unsigned int suiteb_flags = tls1_suiteb(s); /* idx == -1 means checking server chains */ ...
161,309,854,715,343,400,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,730
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int tls1_check_curve(SSL *s, const unsigned char *p, size_t len) { const unsigned char *curves; size_t num_curves, i; unsigned int suiteb_flags = tls1_suiteb(s); if (len != 3 || p[0] != NAMED_CURVE_TYPE) return 0; /* Check curve matches Suite B preferences */ if (suiteb_flags) { ...
94,841,621,028,955,290,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,731
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls1_check_ec_key(SSL *s, unsigned char *curve_id, unsigned char *comp_id) { const unsigned char *pformats, *pcurves; size_t num_formats, num_curves, i; int j; /* * If point formats extension present check it, otherwise everything is * supported (see RFC...
307,142,355,006,259,700,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,732
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
int tls1_check_ec_tmp_key(SSL *s, unsigned long cid) { unsigned char curve_id[2]; EC_KEY *ec = s->cert->ecdh_tmp; # ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL /* Allow any curve: not just those peer supports */ if (s->cert->cert_flags & SSL_CERT_FLAG_BROKEN_PROTOCOL) return 1; # endif /* ...
302,692,041,637,633,330,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,733
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
static int tls1_check_sig_alg(CERT *c, X509 *x, int default_nid) { int sig_nid; size_t i; if (default_nid == -1) return 1; sig_nid = X509_get_signature_nid(x); if (default_nid) return sig_nid == default_nid ? 1 : 0; for (i = 0; i < c->shared_sigalgslen; i++) if (sig_nid =...
32,053,776,732,287,635,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,734
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
void tls1_clear(SSL *s) { ssl3_clear(s); s->version = s->method->version; }
46,206,712,764,112,000,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291
14,735
openssl
76343947ada960b6269090638f5391068daee88d
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
0
long tls1_default_timeout(void) { /* * 2 hours, the 24 hours mentioned in the TLSv1 spec is way too long for * http, the cache would over fill */ return (60 * 60 * 2); }
187,499,077,505,499,420,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
https://nvd.nist.gov/vuln/detail/CVE-2015-0291