idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
15,870
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
None
0
XFixesSetGCClipRegion (Display *dpy, GC gc, int clip_x_origin, int clip_y_origin, XserverRegion region) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesSetGCClipRegionReq *req; XFixesSimpleCheckExtension (dpy, info); LockDisplay (dpy); GetReq (XFixesSetGCClipReg...
261,018,473,665,253,130,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7944
Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
https://nvd.nist.gov/vuln/detail/CVE-2016-7944
15,871
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
None
0
XFixesSetPictureClipRegion (Display *dpy, XID picture, int clip_x_origin, int clip_y_origin, XserverRegion region) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesSetPictureClipRegionReq *req; XFixesSimpleCheckExtension (dpy, info); LockDisplay (dpy); GetReq (XFixe...
201,487,713,006,068,230,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7944
Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
https://nvd.nist.gov/vuln/detail/CVE-2016-7944
15,872
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
None
0
XFixesSetRegion (Display *dpy, XserverRegion region, XRectangle *rectangles, int nrectangles) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesSetRegionReq *req; long len; XFixesSimpleCheckExtension (dpy, info); LockDisplay (dpy); GetReq (XFixesSetRegion, req); req->...
339,077,707,758,550,700,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7944
Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
https://nvd.nist.gov/vuln/detail/CVE-2016-7944
15,873
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
None
0
XFixesSetWindowShapeRegion (Display *dpy, Window win, int shape_kind, int x_off, int y_off, XserverRegion region) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesSetWindowShapeRegionReq *req; XFixesSimpleCheckExtension (dpy, info); LockDisplay (dpy); GetReq (XFixesSetWind...
18,045,614,235,480,718,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7944
Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
https://nvd.nist.gov/vuln/detail/CVE-2016-7944
15,874
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
None
0
XFixesSubtractRegion (Display *dpy, XserverRegion dst, XserverRegion src1, XserverRegion src2) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesSubtractRegionReq *req; XFixesSimpleCheckExtension (dpy, info); LockDisplay (dpy); GetReq (XFixesSubtractRegion, req); req->reqTy...
209,323,103,350,878,850,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7944
Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
https://nvd.nist.gov/vuln/detail/CVE-2016-7944
15,875
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
None
0
XFixesTranslateRegion (Display *dpy, XserverRegion region, int dx, int dy) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesTranslateRegionReq *req; XFixesSimpleCheckExtension (dpy, info); LockDisplay (dpy); GetReq (XFixesTranslateRegion, req); req->reqType = info->codes->major_op...
280,797,979,824,254,500,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7944
Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
https://nvd.nist.gov/vuln/detail/CVE-2016-7944
15,876
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
None
0
XFixesUnionRegion (Display *dpy, XserverRegion dst, XserverRegion src1, XserverRegion src2) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesUnionRegionReq *req; XFixesSimpleCheckExtension (dpy, info); LockDisplay (dpy); GetReq (XFixesUnionRegion, req); req->reqType = info->c...
277,153,794,366,354,400,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7944
Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
https://nvd.nist.gov/vuln/detail/CVE-2016-7944
15,877
libav
136f55207521f0b03194ef5b55ba70f1635d6aee
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=136f55207521f0b03194ef5b55ba70f1635d6aee
mpegvideo_motion: Handle edge emulation even without unrestricted_mv Fix out of bounds read. Bug-Id: 962 Found by: F4B3CD@STARLAB and Agostino Sarubbo Signed-off-by: Vittorio Giovara <vittorio.giovara@gmail.com>
0
static void gmc_motion(MpegEncContext *s, uint8_t *dest_y, uint8_t *dest_cb, uint8_t *dest_cr, uint8_t **ref_picture) { uint8_t *ptr; int linesize, uvlinesize; const int a = s->sprite_warping_accuracy; int ox, oy; linesize = s->linesize; uvlinesiz...
223,540,679,498,198,050,000,000,000,000,000,000,000
mpegvideo_motion.c
61,191,799,423,593,900,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-7424
The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in libav 11.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted MP3 file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7424
15,878
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int alloc_channel_id(Ssh ssh) { const unsigned CHANNEL_NUMBER_OFFSET = 256; unsigned low, high, mid; int tsize; struct ssh_channel *c; /* * First-fit allocation of channel numbers: always pick the * lowest unused one. To do this, binary-search using the * counted B-tree to fin...
320,624,061,170,069,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,879
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
void bndebug(char *string, Bignum b) { unsigned char *p; int i, len; p = ssh2_mpint_fmt(b, &len); debug(("%s", string)); for (i = 0; i < len; i++) debug((" %02x", p[i])); debug(("\n")); sfree(p); }
169,209,189,690,852,730,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,880
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void bomb_out(Ssh ssh, char *text) { ssh_do_close(ssh, FALSE); logevent(text); connection_fatal(ssh->frontend, "%s", text); sfree(text); }
280,453,803,270,323,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,881
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void c_write(Ssh ssh, const char *buf, int len) { if (flags & FLAG_STDERR) c_write_stderr(1, buf, len); else from_backend(ssh->frontend, 1, buf, len); }
72,507,288,605,396,060,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,882
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void c_write_stderr(int trusted, const char *buf, int len) { int i; for (i = 0; i < len; i++) if (buf[i] != '\r' && (trusted || buf[i] == '\n' || (buf[i] & 0x60))) fputc(buf[i], stderr); }
80,022,425,628,195,660,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,883
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void c_write_str(Ssh ssh, const char *buf) { c_write(ssh, buf, strlen(buf)); }
124,753,490,329,853,710,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,884
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static const char *connect_to_host(Ssh ssh, const char *host, int port, char **realhost, int nodelay, int keepalive) { static const struct plug_function_table fn_table = { ssh_socket_log, ssh_closing, ssh_receive, ssh_sent, NULL }; SockAddr addr; const char *err; char *loghost; int ...
206,078,356,279,546,680,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,885
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void defer_packet(Ssh ssh, int pkttype, ...) { struct Packet *pkt; va_list ap; va_start(ap, pkttype); pkt = construct_packet(ssh, pkttype, ap); va_end(ap); s_wrpkt_defer(ssh, pkt); }
275,342,575,540,975,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,886
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int do_ssh_connection_init(Ssh ssh, unsigned char c) { /* * Ordinary SSH begins with the banner "SSH-x.y-...". This is just * the ssh-connection part, extracted and given a trivial binary * packet protocol, so we replace 'SSH-' at the start with a new * name. In proper SSH style (though o...
271,432,698,616,096,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,887
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int do_ssh_init(Ssh ssh, unsigned char c) { static const char protoname[] = "SSH-"; struct do_ssh_init_state { int crLine; int vslen; char version[10]; char *vstring; int vstrsize; int i; int proto1, proto2; }; crState(do_ssh_init_state); crBeginState; /* Search for a line b...
40,061,463,117,260,604,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,888
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void free_rportfwd(struct ssh_rportfwd *pf) { if (pf) { sfree(pf->sportdesc); sfree(pf->shost); sfree(pf->dhost); sfree(pf); } }
100,508,878,295,100,860,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,889
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void hash_mpint(const struct ssh_hash *h, void *s, Bignum b) { unsigned char *p; int len; p = ssh2_mpint_fmt(b, &len); hash_string(h, s, p, len); sfree(p); }
91,407,153,664,652,520,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,890
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void hash_string(const struct ssh_hash *h, void *s, void *str, int len) { unsigned char lenblk[4]; PUT_32BIT(lenblk, len); h->bytes(s, lenblk, 4); h->bytes(s, str, len); }
174,426,121,073,554,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,891
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void hash_uint32(const struct ssh_hash *h, void *s, unsigned i) { unsigned char intblk[4]; PUT_32BIT(intblk, i); h->bytes(s, intblk, 4); }
22,269,431,165,647,130,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,892
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void logeventf(Ssh ssh, const char *fmt, ...) { va_list ap; char *buf; va_start(ap, fmt); buf = dupvprintf(fmt, ap); va_end(ap); logevent(buf); sfree(buf); }
239,679,867,056,778,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,893
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int nullstrcmp(const char *a, const char *b) { if (a == NULL && b == NULL) return 0; if (a == NULL) return -1; if (b == NULL) return +1; return strcmp(a, b); }
318,637,567,403,470,840,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,894
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void parse_ttymodes(Ssh ssh, void (*do_mode)(void *data, const struct ssh_ttymode *mode, char *val), void *data) { int i; const struct ssh_ttymode *mode; char *val; char default_...
287,264,871,383,643,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,895
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void s_wrpkt(Ssh ssh, struct Packet *pkt) { int len, backlog, offset; len = s_wrpkt_prepare(ssh, pkt, &offset); backlog = s_write(ssh, pkt->data + offset, len); if (backlog > SSH_MAX_BACKLOG) ssh_throttle_all(ssh, 1, backlog); ssh_free_packet(pkt); }
3,826,000,372,827,367,500,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,896
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void s_wrpkt_defer(Ssh ssh, struct Packet *pkt) { int len, offset; len = s_wrpkt_prepare(ssh, pkt, &offset); if (ssh->deferred_len + len > ssh->deferred_size) { ssh->deferred_size = ssh->deferred_len + len + 128; ssh->deferred_send_data = sresize(ssh->deferred_send_data, ssh->deferred_size, ...
98,269,245,982,075,020,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,897
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int s_wrpkt_prepare(Ssh ssh, struct Packet *pkt, int *offset_p) { int pad, biglen, i, pktoffs; unsigned long crc; #ifdef __SC__ /* * XXX various versions of SC (including 8.8.4) screw up the * register allocation in this function and use the same register * (D6) for len and as a tempor...
137,851,645,625,319,280,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,898
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void send_packet(Ssh ssh, int pkttype, ...) { struct Packet *pkt; va_list ap; va_start(ap, pkttype); pkt = construct_packet(ssh, pkttype, ap); va_end(ap); s_wrpkt(ssh, pkt); }
76,142,150,243,788,380,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,899
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh1_log_incoming_packet(Ssh ssh, struct Packet *pkt) { int nblanks = 0; struct logblank_t blanks[4]; char *str; int slen; pkt->savedpos = 0; if (ssh->logomitdata && (pkt->type == SSH1_SMSG_STDOUT_DATA || pkt->type == SSH1_SMSG_STDERR_DATA || pkt->type == ...
235,785,568,874,700,220,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,900
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh1_log_outgoing_packet(Ssh ssh, struct Packet *pkt) { int nblanks = 0; struct logblank_t blanks[4]; char *str; int slen; /* * For outgoing packets, pkt->length represents the length of the * whole packet starting at pkt->data (including some header), and * pkt->body ref...
305,747,542,266,126,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,901
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static Bignum ssh1_pkt_getmp(struct Packet *pkt) { int j; Bignum b; j = ssh1_read_bignum(pkt->body + pkt->savedpos, pkt->length - pkt->savedpos, &b); if (j < 0) return NULL; pkt->savedpos += j; return b; }
138,435,134,252,459,430,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,902
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static struct Packet *ssh1_pkt_init(int pkt_type) { struct Packet *pkt = ssh_new_packet(); pkt->length = 4 + 8; /* space for length + max padding */ ssh_pkt_addbyte(pkt, pkt_type); pkt->body = pkt->data + pkt->length; pkt->type = pkt_type; pkt->downstream_id = 0; pkt->additional_log_text...
111,996,490,057,896,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,903
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static struct Packet *ssh1_rdpkt(Ssh ssh, const unsigned char **data, int *datalen) { struct rdpkt1_state_tag *st = &ssh->rdpkt1_state; crBegin(ssh->ssh1_rdpkt_crstate); st->pktin = ssh_new_packet(); st->pktin->type = 0; st->pktin->length = 0; for (st->i = st...
47,155,452,858,001,690,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,904
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_add_sigblob(Ssh ssh, struct Packet *pkt, void *pkblob_v, int pkblob_len, void *sigblob_v, int sigblob_len) { unsigned char *pkblob = (unsigned char *)pkblob_v; unsigned char *sigblob = (unsigned char *)sigblob_v; /* dmemdump(pkblob, pkblob_len); */ /* dmemdump(sigblob, ...
295,403,029,222,771,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,905
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static struct Packet *ssh2_bare_connection_rdpkt(Ssh ssh, const unsigned char **data, int *datalen) { struct rdpkt2_bare_state_tag *st = &ssh->rdpkt2_bare_state; crBegin(ssh->ssh2_bare_rdpkt_crstate); /* ...
269,741,594,725,008,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,906
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_log_incoming_packet(Ssh ssh, struct Packet *pkt) { int nblanks = 0; struct logblank_t blanks[4]; char *str; int slen; pkt->savedpos = 0; if (ssh->logomitdata && (pkt->type == SSH2_MSG_CHANNEL_DATA || pkt->type == SSH2_MSG_CHANNEL_EXTENDED_DATA)) { /* "...
19,891,660,967,097,010,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,907
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_log_outgoing_packet(Ssh ssh, struct Packet *pkt) { int nblanks = 0; struct logblank_t blanks[4]; char *str; int slen; /* * For outgoing packets, pkt->length represents the length of the * whole packet starting at pkt->data (including some header), and * pkt->body ref...
28,952,928,007,105,640,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,908
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static unsigned char *ssh2_mpint_fmt(Bignum b, int *len) { unsigned char *p; int i, n = (bignum_bitcount(b) + 7) / 8; p = snewn(n + 1, unsigned char); p[0] = 0; for (i = 1; i <= n; i++) p[i] = bignum_byte(b, n - i); i = 0; while (i <= n && p[i] == 0 && (p[i + 1] & 0x80) == 0) i++; memm...
218,783,200,766,290,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,909
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_addbool(struct Packet *pkt, unsigned char value) { ssh_pkt_adddata(pkt, &value, 1); }
171,303,735,622,802,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,910
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_addmp(struct Packet *pkt, Bignum b) { unsigned char *p; int len; p = ssh2_mpint_fmt(b, &len); ssh_pkt_addstring_start(pkt); ssh_pkt_addstring_data(pkt, (char *)p, len); sfree(p); }
73,486,966,960,067,110,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,911
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh2_pkt_construct(Ssh ssh, struct Packet *pkt) { int cipherblk, maclen, padding, unencrypted_prefix, i; if (ssh->logctx) ssh2_log_outgoing_packet(ssh, pkt); if (ssh->bare_connection) { /* * Trivial packet construction for the bare connection * protocol. ...
275,938,596,052,769,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,912
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_defer(Ssh ssh, struct Packet *pkt) { if (ssh->queueing) ssh2_pkt_queue(ssh, pkt); else ssh2_pkt_defer_noqueue(ssh, pkt, FALSE); }
94,432,288,796,183,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,913
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_defer_noqueue(Ssh ssh, struct Packet *pkt, int noignore) { int len; if (ssh->cscipher != NULL && (ssh->cscipher->flags & SSH_CIPHER_IS_CBC) && ssh->deferred_len == 0 && !noignore && !(ssh->remote_bugs & BUG_CHOKES_ON_SSH2_IGNORE)) { /* * Interpose an SSH_MSG_IGNORE to ensure that user ...
220,827,973,249,406,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,914
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh2_pkt_getbool(struct Packet *pkt) { unsigned long value; if (pkt->length - pkt->savedpos < 1) return 0; /* arrgh, no way to decline (FIXME?) */ value = pkt->body[pkt->savedpos] != 0; pkt->savedpos++; return value; }
303,278,995,874,562,260,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,915
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static struct Packet *ssh2_pkt_init(int pkt_type) { struct Packet *pkt = ssh_new_packet(); pkt->length = 5; /* space for packet length + padding length */ pkt->forcepad = 0; pkt->type = pkt_type; ssh_pkt_addbyte(pkt, (unsigned char) pkt_type); pkt->body = pkt->data + pkt->length; /* after packet...
326,870,129,455,951,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,916
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_queue(Ssh ssh, struct Packet *pkt) { assert(ssh->queueing); if (ssh->queuelen >= ssh->queuesize) { ssh->queuesize = ssh->queuelen + 32; ssh->queue = sresize(ssh->queue, ssh->queuesize, struct Packet *); } ssh->queue[ssh->queuelen++] = pkt; }
75,010,161,448,844,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,917
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_queuesend(Ssh ssh) { int i; assert(!ssh->queueing); for (i = 0; i < ssh->queuelen; i++) ssh2_pkt_defer_noqueue(ssh, ssh->queue[i], FALSE); ssh->queuelen = 0; ssh_pkt_defersend(ssh); }
212,573,312,958,899,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,918
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_send(Ssh ssh, struct Packet *pkt) { if (ssh->queueing) ssh2_pkt_queue(ssh, pkt); else ssh2_pkt_send_noqueue(ssh, pkt); }
328,827,467,313,238,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,919
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_send_noqueue(Ssh ssh, struct Packet *pkt) { int len; int backlog; if (ssh->cscipher != NULL && (ssh->cscipher->flags & SSH_CIPHER_IS_CBC)) { /* We need to send two packets, so use the deferral mechanism. */ ssh2_pkt_defer_noqueue(ssh, pkt, FALSE); ssh_pkt_defersend(ssh); return; ...
289,194,957,054,072,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,920
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh2_pkt_send_with_padding(Ssh ssh, struct Packet *pkt, int padsize) { #if 0 if (0) { /* * The simplest way to do this is to adjust the * variable-length padding field in the outgoing packet. * * Currently compiled out, because some Cisco SSH servers * don't like excessively padde...
330,715,098,131,383,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,921
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static const char *ssh2_pkt_type(Pkt_KCtx pkt_kctx, Pkt_ACtx pkt_actx, int type) { translatea(SSH2_MSG_USERAUTH_GSSAPI_RESPONSE,SSH2_PKTCTX_GSSAPI); translatea(SSH2_MSG_USERAUTH_GSSAPI_TOKEN,SSH2_PKTCTX_GSSAPI); translatea(SSH2_MSG_USERAUTH_GSSAPI_EXCHANGE_COMPLETE,SSH2_PKTC...
61,087,804,134,680,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,922
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static struct Packet *ssh2_rdpkt(Ssh ssh, const unsigned char **data, int *datalen) { struct rdpkt2_state_tag *st = &ssh->rdpkt2_state; crBegin(ssh->ssh2_rdpkt_crstate); st->pktin = ssh_new_packet(); st->pktin->type = 0; st->pktin->length = 0; if (ssh->scciphe...
16,959,874,014,768,990,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,923
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_channelfind(void *av, void *bv) { unsigned *a = (unsigned *) av; struct ssh_channel *b = (struct ssh_channel *) bv; if (*a < b->localid) return -1; if (*a > b->localid) return +1; return 0; }
179,229,902,878,804,680,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,924
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_closing(Plug plug, const char *error_msg, int error_code, int calling_back) { Ssh ssh = (Ssh) plug; int need_notify = ssh_do_close(ssh, FALSE); if (!error_msg) { if (!ssh->close_expected) error_msg = "Server unexpectedly closed network connection"; else error_msg = "Serv...
63,542,602,278,606,940,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,925
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_comp_none_block(void *handle, unsigned char *block, int len, unsigned char **outblock, int *outlen) { return 0; }
277,141,377,856,308,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,926
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_comp_none_cleanup(void *handle) { }
136,871,537,284,858,750,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,927
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_comp_none_disable(void *handle) { return 0; }
137,967,881,984,128,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,928
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void *ssh_comp_none_init(void) { return NULL; }
168,116,434,342,731,650,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,929
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
void ssh_connshare_log(Ssh ssh, int event, const char *logtext, const char *ds_err, const char *us_err) { if (event == SHARE_NONE) { /* In this case, 'logtext' is an error message indicating a * reason why connection sharing couldn't be set up _at all_. * Failing tha...
181,398,193,300,213,580,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,930
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_detect_bugs(Ssh ssh, char *vstring) { char *imp; /* pointer to implementation part */ imp = vstring; imp += strcspn(imp, "-"); if (*imp) imp++; imp += strcspn(imp, "-"); if (*imp) imp++; ssh->remote_bugs = 0; /* * General notes on server version strings: ...
16,688,036,074,493,195,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,931
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_do_close(Ssh ssh, int notify_exit) { int ret = 0; struct ssh_channel *c; ssh->state = SSH_STATE_CLOSED; expire_timer_context(ssh); if (ssh->s) { sk_close(ssh->s); ssh->s = NULL; if (notify_exit) notify_remote_exit(ssh->frontend); else ...
26,559,473,794,661,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,932
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_fix_verstring(char *str) { /* Eat "<protoversion>-". */ while (*str && *str != '-') str++; assert(*str == '-'); str++; /* Convert minus signs and spaces in the remaining string into * underscores. */ while (*str) { if (*str == '-' || *str == ' ') *str = '_';...
132,079,971,942,704,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,933
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_free_packet(struct Packet *pkt) { sfree(pkt->data); sfree(pkt); }
282,036,113,130,683,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,934
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_gotdata(Ssh ssh, const unsigned char *data, int datalen) { /* Log raw data, if we're in that mode. */ if (ssh->logctx) log_packet(ssh->logctx, PKT_INCOMING, -1, NULL, data, datalen, 0, NULL, NULL, 0, NULL); crBegin(ssh->ssh_gotdata_crstate); /* * To begin with, feed the char...
271,392,582,219,673,820,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,935
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_hostport_setup(const char *host, int port, Conf *conf, char **savedhost, int *savedport, char **loghost_ret) { char *loghost = conf_get_str(conf, CONF_loghost); if (loghost_ret) *loghost_ret = loghost; if (*loghost) { ch...
278,715,791,568,813,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,936
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static struct Packet *ssh_new_packet(void) { struct Packet *pkt = snew(struct Packet); pkt->body = pkt->data = NULL; pkt->maxlen = 0; return pkt; }
158,007,946,012,211,660,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,937
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_pkt_addstring(struct Packet *pkt, const char *data) { ssh_pkt_addstring_start(pkt); ssh_pkt_addstring_str(pkt, data); }
74,660,900,349,737,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,938
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_pkt_addstring_start(struct Packet *pkt) { ssh_pkt_adduint32(pkt, 0); pkt->savedpos = pkt->length; }
49,395,045,714,738,790,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,939
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_pkt_addstring_str(struct Packet *pkt, const char *data) { ssh_pkt_addstring_data(pkt, data, strlen(data)); }
52,632,729,765,945,590,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,940
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_pkt_adduint32(struct Packet *pkt, unsigned long value) { unsigned char x[4]; PUT_32BIT(x, value); ssh_pkt_adddata(pkt, x, 4); }
192,273,665,588,630,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,941
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_pkt_defersend(Ssh ssh) { int backlog; backlog = s_write(ssh, ssh->deferred_send_data, ssh->deferred_len); ssh->deferred_len = ssh->deferred_size = 0; sfree(ssh->deferred_send_data); ssh->deferred_send_data = NULL; if (backlog > SSH_MAX_BACKLOG) ssh_throttle_all(ssh, 1, backlog);...
76,839,359,403,083,740,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,942
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_pkt_ensure(struct Packet *pkt, int length) { if (pkt->maxlen < length) { unsigned char *body = pkt->body; int offset = body ? body - pkt->data : 0; pkt->maxlen = length + 256; pkt->data = sresize(pkt->data, pkt->maxlen + APIEXTRA, unsigned char); if (body) pkt->body = pkt->data + offset; } ...
289,847,091,193,334,480,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,943
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_pkt_getstring(struct Packet *pkt, char **p, int *length) { int len; *p = NULL; *length = 0; if (pkt->length - pkt->savedpos < 4) return; len = toint(GET_32BIT(pkt->body + pkt->savedpos)); if (len < 0) return; *length = len; pkt->savedpos += 4; if (pkt->length - pkt-...
151,401,641,392,909,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,944
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static unsigned long ssh_pkt_getuint32(struct Packet *pkt) { unsigned long value; if (pkt->length - pkt->savedpos < 4) return 0; /* arrgh, no way to decline (FIXME?) */ value = GET_32BIT(pkt->body + pkt->savedpos); pkt->savedpos += 4; return value; }
225,178,251,622,248,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,945
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static const char *ssh_pkt_type(Ssh ssh, int type) { if (ssh->version == 1) return ssh1_pkt_type(type); else return ssh2_pkt_type(ssh->pkt_kctx, ssh->pkt_actx, type); }
18,837,290,965,495,417,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,946
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_portcmp(void *av, void *bv) { struct ssh_portfwd *a = (struct ssh_portfwd *) av; struct ssh_portfwd *b = (struct ssh_portfwd *) bv; int i; if (a->type > b->type) return +1; if (a->type < b->type) return -1; if (a->addressfamily > b->addressfamily) return +1; if (a->addressf...
255,188,720,706,790,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,947
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_process_incoming_data(Ssh ssh, const unsigned char **data, int *datalen) { struct Packet *pktin; pktin = ssh->s_rdpkt(ssh, data, datalen); if (pktin) { ssh->protocol(ssh, NULL, 0, pktin); ssh_free_packet(pktin); } }
133,053,065,281,277,130,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,948
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_process_queued_incoming_data(Ssh ssh) { void *vdata; const unsigned char *data; int len, origlen; while (!ssh->frozen && bufchain_size(&ssh->queued_incoming_data)) { bufchain_prefix(&ssh->queued_incoming_data, &vdata, &len); data = vdata; origlen = len; while (!ssh->frozen && len >...
220,307,873,025,183,960,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,949
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_queue_incoming_data(Ssh ssh, const unsigned char **data, int *datalen) { bufchain_add(&ssh->queued_incoming_data, *data, *datalen); *data += *datalen; *datalen = 0; }
11,985,463,837,882,271,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,950
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_receive(Plug plug, int urgent, char *data, int len) { Ssh ssh = (Ssh) plug; ssh_gotdata(ssh, (unsigned char *)data, len); if (ssh->state == SSH_STATE_CLOSED) { ssh_do_close(ssh, TRUE); return 0; } return 1; }
275,860,688,972,757,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,951
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_rportcmp_ssh1(void *av, void *bv) { struct ssh_rportfwd *a = (struct ssh_rportfwd *) av; struct ssh_rportfwd *b = (struct ssh_rportfwd *) bv; int i; if ( (i = strcmp(a->dhost, b->dhost)) != 0) return i < 0 ? -1 : +1; if (a->dport > b->dport) return +1; if (a->dport < b->dport) ...
136,873,118,504,627,480,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,952
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_rportcmp_ssh2(void *av, void *bv) { struct ssh_rportfwd *a = (struct ssh_rportfwd *) av; struct ssh_rportfwd *b = (struct ssh_rportfwd *) bv; int i; if ( (i = strcmp(a->shost, b->shost)) != 0) return i < 0 ? -1 : +1; if (a->sport > b->sport) return +1; if (a->sport < b->sport) ...
339,918,513,357,860,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,953
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_send_verstring(Ssh ssh, const char *protoname, char *svers) { char *verstring; if (ssh->version == 2) { /* * Construct a v2 version string. */ verstring = dupprintf("%s2.0-%s\015\012", protoname, sshver); } else { /* * Construct a v1 version string. */ assert(!strcmp(prot...
120,628,138,213,746,660,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,954
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_sent(Plug plug, int bufsize) { Ssh ssh = (Ssh) plug; /* * If the send backlog on the SSH socket itself clears, we * should unthrottle the whole world if it was throttled. */ if (bufsize < SSH_MAX_BACKLOG) ssh_throttle_all(ssh, 0, bufsize); }
186,484,141,585,362,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,955
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_set_frozen(Ssh ssh, int frozen) { if (ssh->s) sk_set_frozen(ssh->s, frozen); ssh->frozen = frozen; }
152,663,698,814,473,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,956
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static int ssh_test_for_upstream(const char *host, int port, Conf *conf) { char *savedhost; int savedport; int ret; random_ref(); /* platform may need this to determine share socket name */ ssh_hostport_setup(host, port, conf, &savedhost, &savedport, NULL); ret = ssh_share_test_for_upstream(sav...
156,978,669,351,908,850,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,957
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static void ssh_throttle_conn(Ssh ssh, int adjust) { int old_count = ssh->conn_throttle_count; ssh->conn_throttle_count += adjust; assert(ssh->conn_throttle_count >= 0); if (ssh->conn_throttle_count && !old_count) { } }
128,690,798,958,080,990,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,958
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
static unsigned int ssh_tty_parse_specchar(char *s) { unsigned int ret; if (*s) { char *next = NULL; ret = ctrlparse(s, &next); if (!next) ret = s[0]; } else { ret = 255; /* special value meaning "don't set" */ } return ret; }
304,397,307,944,611,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,959
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
https://git.tartarus.org/?p=simon/putty
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
None
0
int agent_exists(void) { HWND hwnd; hwnd = FindWindow("Pageant", "Pageant"); if (!hwnd) return FALSE; else return TRUE; }
168,458,141,818,786,920,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-6542
15,996
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
X509_CRL *X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) { X509_CRL *crl = NULL; int i; STACK_OF(X509_REVOKED) *revs = NULL; /* CRLs can't be delta already */ if (base->base_crl_number || newer->base_crl_number) { ...
237,396,656,118,435,270,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
15,997
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) { /* * We need to be idempotent because, unfortunately, free() also calls * cleanup(), so the natural call sequence new(), init(), cleanup(), free() * calls cleanup() for the same object twice! Thus we must zero the * pointers below after they're...
290,525,848,851,403,350,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
15,998
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) { if (!ctx->chain) return NULL; return X509_chain_up_ref(ctx->chain); }
37,008,237,058,353,950,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
15,999
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
int X509_verify_cert(X509_STORE_CTX *ctx) { X509 *x, *xtmp, *xtmp2, *chain_ss = NULL; int bad_chain = 0; X509_VERIFY_PARAM *param = ctx->param; int depth, i, ok = 0; int num, j, retry; int (*cb) (int xok, X509_STORE_CTX *xctx); STACK_OF(X509) *sktmp = NULL; int trust = X509_TRUST_UNTRUST...
27,021,596,997,414,420,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
16,000
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
static int check_cert(X509_STORE_CTX *ctx) { X509_CRL *crl = NULL, *dcrl = NULL; X509 *x; int ok, cnum; unsigned int last_reasons; cnum = ctx->error_depth; x = sk_X509_value(ctx->chain, cnum); ctx->current_cert = x; ctx->current_issuer = NULL; ctx->current_crl_score = 0; ctx->cur...
296,914,209,746,112,450,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
16,001
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
static int check_chain_extensions(X509_STORE_CTX *ctx) { #ifdef OPENSSL_NO_CHAIN_VERIFY return 1; #else int i, ok = 0, must_be_ca, plen = 0; X509 *x; int (*cb) (int xok, X509_STORE_CTX *xctx); int proxy_path_length = 0; int purpose; int allow_proxy_certs; cb = ctx->verify_cb; /*- ...
331,669,087,567,090,230,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
16,002
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
static int check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) { X509 *issuer = NULL; EVP_PKEY *ikey = NULL; int ok = 0, chnum, cnum; cnum = ctx->error_depth; chnum = sk_X509_num(ctx->chain) - 1; /* if we have an alternative CRL issuer cert use that */ if (ctx->current_issuer) issuer = ctx...
254,139,821,483,245,360,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
16,003
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
static int check_hosts(X509 *x, X509_VERIFY_PARAM_ID *id) { int i; int n = sk_OPENSSL_STRING_num(id->hosts); char *name; if (id->peername != NULL) { OPENSSL_free(id->peername); id->peername = NULL; } for (i = 0; i < n; ++i) { name = sk_OPENSSL_STRING_value(id->hosts, i);...
297,191,557,374,608,100,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
16,004
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
static int check_id(X509_STORE_CTX *ctx) { X509_VERIFY_PARAM *vpm = ctx->param; X509_VERIFY_PARAM_ID *id = vpm->id; X509 *x = ctx->cert; if (id->hosts && check_hosts(x, id) <= 0) { if (!check_id_error(ctx, X509_V_ERR_HOSTNAME_MISMATCH)) return 0; } if (id->email && X509_check...
122,316,311,069,463,860,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052
16,005
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6e629b5be45face20b4ca71c4fcbfed78b864a2e
Add some sanity checks when checking CRL scores Note: this was accidentally omitted from OpenSSL 1.0.2 branch. Without this fix any attempt to use CRLs will crash. CVE-2016-7052 Thanks to Bruce Stephens and Thomas Jakobi for reporting this issue. Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Rich Sal...
0
static int check_id_error(X509_STORE_CTX *ctx, int errcode) { ctx->error = errcode; ctx->current_cert = ctx->cert; ctx->error_depth = 0; return ctx->verify_cb(0, ctx); }
114,592,313,188,918,370,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2016-7052
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-7052