idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
17,359 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 0 | init_compress( compress_filter_context_t *zfx, z_stream *zs )
{
int rc;
int level;
#if defined(__riscos__) && defined(USE_ZLIBRISCOS)
static int zlib_initialized = 0;
if (!zlib_initialized)
zlib_initialized = riscos_load_module("ZLib", zlib_path, 1);
#endif
if( opt.compress_level >= 1 && ... | 91,323,874,208,994,070,000,000,000,000,000,000,000 | compress.c | 48,334,665,728,577,810,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
17,360 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 0 | init_uncompress( compress_filter_context_t *zfx, z_stream *zs )
{
int rc;
/****************
* PGP uses a windowsize of 13 bits. Using a negative value for
* it forces zlib not to expect a zlib header. This is a
* undocumented feature Peter Gutmann told me about.
*
* We must use 15... | 28,135,867,284,964,923,000,000,000,000,000,000,000 | compress.c | 48,334,665,728,577,810,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
17,361 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 0 | push_compress_filter(IOBUF out,compress_filter_context_t *zfx,int algo)
{
push_compress_filter2(out,zfx,algo,0);
}
| 288,125,246,056,774,800,000,000,000,000,000,000,000 | compress.c | 48,334,665,728,577,810,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
17,362 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 0 | push_compress_filter2(IOBUF out,compress_filter_context_t *zfx,
int algo,int rel)
{
if(algo>=0)
zfx->algo=algo;
else
zfx->algo=DEFAULT_COMPRESS_ALGO;
switch(zfx->algo)
{
case COMPRESS_ALGO_NONE:
break;
case COMPRESS_ALGO_ZIP:
case COMPRESS_ALGO_ZLIB:
iobuf_push_filter... | 167,987,471,267,118,120,000,000,000,000,000,000,000 | compress.c | 48,334,665,728,577,810,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
17,363 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 0 | release_context (compress_filter_context_t *ctx)
{
xfree (ctx);
}
| 147,127,971,884,654,500,000,000,000,000,000,000,000 | compress.c | 48,334,665,728,577,810,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
17,364 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static NTSTATUS check_guest_password(auth_serversupplied_info **server_info)
{
struct auth_context *auth_context;
auth_usersupplied_info *user_info = NULL;
NTSTATUS nt_status;
unsigned char chal[8];
ZERO_STRUCT(chal);
DEBUG(3,("Got anonymous request\n"));
if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fi... | 189,236,863,006,382,400,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,365 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static NTSTATUS check_spnego_blob_complete(struct smbd_server_connection *sconn,
uint16 smbpid, uint16 vuid,
DATA_BLOB *pblob)
{
struct pending_auth_data *pad = NULL;
ASN1_DATA *data;
size_t needed_len = 0;
pad = get_pending_auth_data(sconn, smbpid);
/* Ensure we have some data. */
if (pblob->le... | 152,226,337,551,813,100,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,366 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static void delete_partial_auth(struct smbd_server_connection *sconn,
struct pending_auth_data *pad)
{
if (!pad) {
return;
}
DLIST_REMOVE(sconn->smb1.pd_list, pad);
data_blob_free(&pad->partial_data);
SAFE_FREE(pad);
}
| 204,573,461,498,704,440,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,367 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static NTSTATUS do_map_to_guest(NTSTATUS status,
auth_serversupplied_info **server_info,
const char *user, const char *domain)
{
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) {
if ((lp_map_to_guest() == MAP_TO_GUEST_ON_BAD_USER) ||
(lp_map_to_guest() == MAP_TO_GUEST_ON_BAD_PASSWORD)) {
DEBUG(... | 313,401,748,220,854,550,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,368 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static struct pending_auth_data *get_pending_auth_data(
struct smbd_server_connection *sconn,
uint16_t smbpid)
{
struct pending_auth_data *pad;
/*
* NOTE: using the smbpid here is completely wrong...
* see [MS-SMB]
* 3.3.5.3 Receiving an SMB_COM_SESSION_SETUP_ANDX Request
*/
for (pad = sconn->smb1... | 323,763,986,210,043,640,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,369 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | NTSTATUS parse_spnego_mechanisms(DATA_BLOB blob_in,
DATA_BLOB *pblob_out,
char **kerb_mechOID)
{
char *OIDs[ASN1_MAX_OIDS];
int i;
NTSTATUS ret = NT_STATUS_OK;
*kerb_mechOID = NULL;
/* parse out the OIDs and the first sec blob */
if (!parse_negTokenTarg(blob_in, OIDs, pblob_out)) {
return NT_STATUS_LOGON_... | 152,980,675,609,072,820,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,370 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static int push_signature(uint8 **outbuf)
{
char *lanman;
int result, tmp;
result = 0;
tmp = message_push_string(outbuf, "Unix", STR_TERMINATE);
if (tmp == -1) return -1;
result += tmp;
if (asprintf(&lanman, "Samba %s", samba_version_string()) != -1) {
tmp = message_push_string(outbuf, lanman, STR_TERMINAT... | 245,540,837,454,357,400,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,371 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | void reply_sesssetup_and_X(struct smb_request *req)
{
int sess_vuid;
int smb_bufsize;
DATA_BLOB lm_resp;
DATA_BLOB nt_resp;
DATA_BLOB plaintext_password;
char *tmp;
const char *user;
fstring sub_user; /* Sainitised username for substituion */
const char *domain;
const char *native_os;
const char *native_lanm... | 142,160,603,849,879,590,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,372 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static void reply_sesssetup_blob(struct smb_request *req,
DATA_BLOB blob,
NTSTATUS nt_status)
{
if (!NT_STATUS_IS_OK(nt_status) &&
!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
reply_nterror(req, nt_status_squash(nt_status));
return;
}
nt_status = nt_status_squash(nt_status);... | 250,578,620,099,327,700,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,373 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static void reply_spnego_auth(struct smb_request *req,
uint16 vuid,
DATA_BLOB blob1,
AUTH_NTLMSSP_STATE **auth_ntlmssp_state)
{
DATA_BLOB auth = data_blob_null;
DATA_BLOB auth_reply = data_blob_null;
DATA_BLOB secblob = data_blob_null;
NTSTATUS status = NT_STATUS_LOGON_FAILURE;
struct sm... | 221,925,765,565,388,000,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,374 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static void reply_spnego_kerberos(struct smb_request *req,
DATA_BLOB *secblob,
const char *mechOID,
uint16 vuid,
bool *p_invalidate_vuid)
{
TALLOC_CTX *mem_ctx;
DATA_BLOB ticket;
char *client, *p, *domain;
fstring netbios_domain_name;
struct passwd *pw;
fstring user;
int sess_vuid = req->... | 105,551,098,846,521,000,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,375 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static void reply_spnego_negotiate(struct smb_request *req,
uint16 vuid,
DATA_BLOB blob1,
AUTH_NTLMSSP_STATE **auth_ntlmssp_state)
{
DATA_BLOB secblob;
DATA_BLOB chal;
char *kerb_mech = NULL;
NTSTATUS status;
struct smbd_server_connection *sconn = smbd_server_conn;
status = parse_spnego_mech... | 20,402,828,506,819,645,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,376 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static void reply_spnego_ntlmssp(struct smb_request *req,
uint16 vuid,
AUTH_NTLMSSP_STATE **auth_ntlmssp_state,
DATA_BLOB *ntlmssp_blob, NTSTATUS nt_status,
const char *OID,
bool wrap)
{
DATA_BLOB response;
struct auth_serversupplied_info *server_info = NULL;
struct smbd_server_connection *s... | 165,573,686,735,451,130,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,377 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static void setup_new_vc_session(void)
{
char addr[INET6_ADDRSTRLEN];
DEBUG(2,("setup_new_vc_session: New VC == 0, if NT4.x "
"compatible we would close all old resources.\n"));
#if 0
conn_close_all();
invalidate_all_vuids();
#endif
if (lp_reset_on_zero_vc()) {
connections_forall(shutdown_other_smbds,
CONS... | 141,169,101,653,222,840,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,378 | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). | 0 | static int shutdown_other_smbds(struct db_record *rec,
const struct connections_key *key,
const struct connections_data *crec,
void *private_data)
{
const char *ip = (const char *)private_data;
if (!process_exists(crec->pid)) {
return 0;
}
if (procid_is_me(&crec->pid)) {
return 0;
}
if (strcmp(... | 44,862,978,662,407,410,000,000,000,000,000,000,000 | sesssetup.c | 54,377,162,305,834,695,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-1642 | The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request. | https://nvd.nist.gov/vuln/detail/CVE-2010-1642 |
17,379 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | void add_to_common_flags2(uint32 v)
{
common_flags2 |= v;
}
| 107,596,909,198,093,110,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,380 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | NTSTATUS allow_new_trans(struct trans_state *list, int mid)
{
int count = 0;
for (; list != NULL; list = list->next) {
if (list->mid == mid) {
return NT_STATUS_INVALID_PARAMETER;
}
count += 1;
}
if (count > 5) {
return NT_STATUS_INSUFFICIENT_RESOURCES;
}
return NT_STATUS_OK;
}
| 52,675,210,491,839,870,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,381 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void construct_reply(char *inbuf, int size, size_t unread_bytes,
uint32_t seqnum, bool encrypted,
struct smb_perfcount_data *deferred_pcd)
{
connection_struct *conn;
struct smb_request *req;
if (!(req = talloc(talloc_tos(), struct smb_request))) {
smb_panic("could not allocate smb_request");
... | 155,512,300,356,413,710,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,382 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | void construct_reply_common_req(struct smb_request *req, char *outbuf)
{
construct_reply_common(req, (char *)req->inbuf, outbuf);
}
| 322,339,024,073,642,400,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,383 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool create_outbuf(TALLOC_CTX *mem_ctx, struct smb_request *req,
const char *inbuf, char **outbuf, uint8_t num_words,
uint32_t num_bytes)
{
/*
* Protect against integer wrap
*/
if ((num_bytes > 0xffffff)
|| ((num_bytes + smb_size + num_words*2) > 0xffffff)) {
char *msg;
if ... | 19,520,717,218,285,001,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,384 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool deadtime_fn(const struct timeval *now, void *private_data)
{
struct smbd_server_connection *sconn = smbd_server_conn;
if ((conn_num_open(sconn) == 0)
|| (conn_idle_all(sconn, now->tv_sec))) {
DEBUG( 2, ( "Closing idle connection\n" ) );
messaging_send(smbd_messaging_context(), procid_self(),
... | 127,829,656,513,201,030,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,385 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | struct idle_event *event_add_idle(struct event_context *event_ctx,
TALLOC_CTX *mem_ctx,
struct timeval interval,
const char *name,
bool (*handler)(const struct timeval *now,
void *private_data),
void *private_data)
{
struct idle_event *result;
struct timeval now = timeval_current... | 184,034,130,308,515,870,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,386 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool find_andx_cmd_ofs(uint8_t *buf, size_t *pofs)
{
uint8_t cmd;
size_t ofs;
cmd = CVAL(buf, smb_com);
SMB_ASSERT(is_andx_req(cmd));
ofs = smb_vwv0;
while (CVAL(buf, ofs) != 0xff) {
if (!is_andx_req(CVAL(buf, ofs))) {
return false;
}
/*
* ofs is from start of smb header, so add the 4 len... | 266,819,440,988,725,830,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,387 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void fixup_chain_error_packet(struct smb_request *req)
{
uint8_t *outbuf = req->outbuf;
req->outbuf = NULL;
reply_outbuf(req, 2, 0);
memcpy(req->outbuf, outbuf, smb_wct);
TALLOC_FREE(outbuf);
SCVAL(req->outbuf, smb_vwv0, 0xff);
}
| 238,684,550,095,012,450,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,388 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool housekeeping_fn(const struct timeval *now, void *private_data)
{
change_to_root_user();
/* update printer queue caches if necessary */
update_monitored_printq_cache();
/* check if we need to reload services */
check_reload(time(NULL));
/* Change machine password if neccessary. */
attempt_machine_p... | 12,092,007,857,613,825,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,389 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void init_smb_request(struct smb_request *req, const uint8 *inbuf,
size_t unread_bytes, bool encrypted,
uint32_t seqnum)
{
struct smbd_server_connection *sconn = smbd_server_conn;
size_t req_size = smb_len(inbuf) + 4;
/* Ensure we have at least smb_size bytes. */
if (req_size < smb_size) {
... | 289,162,821,435,465,600,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,390 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool keepalive_fn(const struct timeval *now, void *private_data)
{
if (!send_keepalive(smbd_server_fd())) {
DEBUG( 2, ( "Keepalive failed - exiting.\n" ) );
return False;
}
return True;
}
| 331,263,621,839,171,660,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,391 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | bool open_was_deferred(uint16 mid)
{
struct pending_message_list *pml;
for (pml = deferred_open_queue; pml; pml = pml->next) {
if (SVAL(pml->buf.data,smb_mid) == mid && !pml->processed) {
return True;
}
}
return False;
}
| 56,578,889,719,442,870,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,392 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void process_smb(struct smbd_server_connection *conn,
uint8_t *inbuf, size_t nread, size_t unread_bytes,
uint32_t seqnum, bool encrypted,
struct smb_perfcount_data *deferred_pcd)
{
int msg_type = CVAL(inbuf,0);
DO_PROFILE_INC(smb_count);
DEBUG( 6, ( "got message type 0x%x of len 0x%x\n", msg_type,
... | 168,542,368,584,421,850,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,393 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | bool push_deferred_smb_message(struct smb_request *req,
struct timeval request_time,
struct timeval timeout,
char *private_data, size_t priv_len)
{
struct timeval end_time;
if (req->unread_bytes) {
DEBUG(0,("push_deferred_smb_message: logic error ! "
"unread_bytes = %u\n",
(unsi... | 202,311,682,391,703,530,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,394 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool push_queued_message(struct smb_request *req,
struct timeval request_time,
struct timeval end_time,
char *private_data, size_t private_len)
{
int msg_len = smb_len(req->inbuf) + 4;
struct pending_message_list *msg;
msg = TALLOC_ZERO_P(NULL, struct pending_message_list);
if(msg == NULL) {
... | 230,595,747,573,409,600,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,395 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static NTSTATUS read_packet_remainder(int fd, char *buffer,
unsigned int timeout, ssize_t len)
{
if (len <= 0) {
return NT_STATUS_OK;
}
return read_fd_with_timeout(fd, buffer, len, len, timeout, NULL);
}
| 61,802,208,335,441,040,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,396 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static NTSTATUS receive_smb_raw_talloc(TALLOC_CTX *mem_ctx, int fd,
char **buffer, unsigned int timeout,
size_t *p_unread, size_t *plen)
{
char lenbuf[4];
size_t len;
int min_recv_size = lp_min_receive_file_size();
NTSTATUS status;
*p_unread = 0;
status = read_smb_length_return_keepalive(f... | 144,050,946,382,005,000,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,397 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static NTSTATUS receive_smb_raw_talloc_partial_read(TALLOC_CTX *mem_ctx,
const char lenbuf[4],
int fd, char **buffer,
unsigned int timeout,
size_t *p_unread,
size_t *len_ret)
{
/* Size of a WRITEX call (+4 byte len). */
char writeX_header[4 + STANDARD_WRITE_AND_X_HEAD... | 3,582,969,447,860,865,400,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,398 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx, int fd,
char **buffer, unsigned int timeout,
size_t *p_unread, bool *p_encrypted,
size_t *p_len,
uint32_t *seqnum)
{
size_t len = 0;
NTSTATUS status;
*p_encrypted = false;
status = receive_smb_raw_talloc(mem_ctx, fd, buffer, timeo... | 103,265,340,987,524,620,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,399 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | void remove_from_common_flags2(uint32 v)
{
common_flags2 &= ~v;
}
| 130,158,997,320,013,220,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,400 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | bool req_is_in_chain(struct smb_request *req)
{
if (req->vwv != (uint16_t *)(req->inbuf+smb_vwv)) {
/*
* We're right now handling a subsequent request, so we must
* be in a chain
*/
return true;
}
if (!is_andx_req(req->cmd)) {
return false;
}
if (req->wct < 2) {
/*
* Okay, an illegal request,... | 156,889,636,207,598,480,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,401 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | size_t req_wct_ofs(struct smb_request *req)
{
size_t buf_size;
if (req->chain_outbuf == NULL) {
return smb_wct - 4;
}
buf_size = talloc_get_size(req->chain_outbuf);
if ((buf_size % 4) != 0) {
buf_size += (4 - (buf_size % 4));
}
return buf_size - 4;
}
| 97,733,356,894,371,470,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,402 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | void schedule_deferred_open_smb_message(uint16 mid)
{
struct pending_message_list *pml;
int i = 0;
for (pml = deferred_open_queue; pml; pml = pml->next) {
uint16 msg_mid = SVAL(pml->buf.data,smb_mid);
DEBUG(10,("schedule_deferred_open_smb_message: [%d] msg_mid = %u\n", i++,
(unsigned int)msg_mid ));
if (... | 58,637,565,427,185,000,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,403 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void smb_dump(const char *name, int type, const char *data, ssize_t len)
{
int fd, i;
char *fname = NULL;
if (DEBUGLEVEL < 50) {
return;
}
if (len < 4) len = smb_len(data)+4;
for (i=1;i<100;i++) {
if (asprintf(&fname, "/tmp/%s.%d.%s", name, i,
type ? "req" : "resp") == -1) {
return;
}
f... | 269,721,852,740,914,920,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,404 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | const char *smb_fn_name(int type)
{
const char *unknown_name = "SMBunknown";
if (smb_messages[type].name == NULL)
return(unknown_name);
return(smb_messages[type].name);
}
| 280,718,247,936,011,000,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,405 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool smb_splice_chain(uint8_t **poutbuf, uint8_t smb_command,
uint8_t wct, const uint16_t *vwv,
size_t bytes_alignment,
uint32_t num_bytes, const uint8_t *bytes)
{
uint8_t *outbuf;
size_t old_size, new_size;
size_t ofs;
size_t chain_padding = 0;
size_t bytes_padding = 0;
bool first_... | 133,997,285,206,231,840,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,406 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void smbd_deferred_open_timer(struct event_context *ev,
struct timed_event *te,
struct timeval _tval,
void *private_data)
{
struct pending_message_list *msg = talloc_get_type(private_data,
struct pending_message_list);
TALLOC_CTX *mem_ctx = talloc_tos();
uint16_t mid = SVAL(... | 23,372,852,576,104,340,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,407 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void smbd_idle_event_handler(struct event_context *ctx,
struct timed_event *te,
struct timeval now,
void *private_data)
{
struct idle_event *event =
talloc_get_type_abort(private_data, struct idle_event);
TALLOC_FREE(event->te);
DEBUG(10,("smbd_idle_event_handler: %s %p called\n",
... | 170,368,658,635,728,760,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,408 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | void smbd_process(void)
{
TALLOC_CTX *frame = talloc_stackframe();
char remaddr[INET6_ADDRSTRLEN];
if (lp_maxprotocol() == PROTOCOL_SMB2 &&
lp_security() != SEC_SHARE) {
smbd_server_conn->allow_smb2 = true;
}
/* Ensure child is set to blocking mode */
set_blocking(smbd_server_fd(),True);
set_socket_opt... | 209,497,853,873,040,500,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,409 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static NTSTATUS smbd_server_connection_loop_once(struct smbd_server_connection *conn)
{
fd_set r_fds, w_fds;
int selrtn;
struct timeval to;
int maxfd = 0;
to.tv_sec = SMBD_SELECT_TIMEOUT;
to.tv_usec = 0;
/*
* Setup the select fd sets.
*/
FD_ZERO(&r_fds);
FD_ZERO(&w_fds);
/*
* Are there any timed eve... | 151,730,470,542,846,200,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,410 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | void smbd_setup_sig_hup_handler(void)
{
struct tevent_signal *se;
se = tevent_add_signal(smbd_event_context(),
smbd_event_context(),
SIGHUP, 0,
smbd_sig_hup_handler,
NULL);
if (!se) {
exit_server("failed to setup SIGHUP handler");
}
}
| 75,234,412,221,575,320,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,411 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | void smbd_setup_sig_term_handler(void)
{
struct tevent_signal *se;
se = tevent_add_signal(smbd_event_context(),
smbd_event_context(),
SIGTERM, 0,
smbd_sig_term_handler,
NULL);
if (!se) {
exit_server("failed to setup SIGTERM handler");
}
}
| 182,427,833,898,082,900,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,412 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void smbd_sig_hup_handler(struct tevent_context *ev,
struct tevent_signal *se,
int signum,
int count,
void *siginfo,
void *private_data)
{
change_to_root_user();
DEBUG(1,("Reloading services after SIGHUP\n"));
reload_services(False);
}
| 133,521,084,978,428,300,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,413 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static void smbd_sig_term_handler(struct tevent_context *ev,
struct tevent_signal *se,
int signum,
int count,
void *siginfo,
void *private_data)
{
exit_server_cleanly("termination signal");
}
| 196,967,209,037,801,360,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,414 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | bool srv_send_smb(int fd, char *buffer,
bool do_signing, uint32_t seqnum,
bool do_encrypt,
struct smb_perfcount_data *pcd)
{
size_t len = 0;
size_t nwritten=0;
ssize_t ret;
char *buf_out = buffer;
if (do_signing) {
/* Sign the outgoing packet if required. */
srv_calculate_sign_mac(smbd_server_conn... | 10,043,787,984,829,753,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,415 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | int srv_set_message(char *buf,
int num_words,
int num_bytes,
bool zero)
{
if (zero && (num_words || num_bytes)) {
memset(buf + smb_size,'\0',num_words*2 + num_bytes);
}
SCVAL(buf,smb_wct,num_words);
SSVAL(buf,smb_vwv + num_words*SIZEOFWORD,nu... | 41,859,469,342,677,930,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,416 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static connection_struct *switch_message(uint8 type, struct smb_request *req, int size)
{
int flags;
uint16 session_tag;
connection_struct *conn = NULL;
struct smbd_server_connection *sconn = smbd_server_conn;
errno = 0;
/* Make sure this is an SMB packet. smb_size contains NetBIOS header
* so subtract 4 from... | 301,278,926,909,420,850,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,417 | samba | 25452a2268ac7013da28125f3df22085139af12d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker | 0 | static bool valid_smb_header(const uint8_t *inbuf)
{
if (is_encrypted_packet(inbuf)) {
return true;
}
/*
* This used to be (strncmp(smb_base(inbuf),"\377SMB",4) == 0)
* but it just looks weird to call strncmp for this one.
*/
return (IVAL(smb_base(inbuf), 0) == 0x424D53FF);
}
| 259,660,569,013,103,200,000,000,000,000,000,000,000 | process.c | 86,125,744,420,152,730,000,000,000,000,000,000,000 | [] | CVE-2010-1635 | The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f... | https://nvd.nist.gov/vuln/detail/CVE-2010-1635 |
17,426 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | _asn1_get_indefinite_length_string (const unsigned char *der,
int der_len, int *len)
{
int len2, len3, counter, indefinite;
int result;
unsigned long tag;
unsigned char class;
counter = indefinite = 0;
while (1)
{
if (HAVE_TWO(der_len) && (der[counter] == 0) && (der[counter + 1] == 0))
... | 171,226,228,192,427,360,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,427 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | _asn1_get_time_der (unsigned type, const unsigned char *der, int der_len, int *ret_len,
char *str, int str_size, unsigned flags)
{
int len_len, str_len;
unsigned i;
unsigned sign_count = 0;
unsigned dot_count = 0;
const unsigned char *p;
if (der_len <= 0 || str == NULL)
return ASN1_DER_ERROR;
... | 70,860,900,718,300,860,000,000,000,000,000,000,000 | decoding.c | 642,843,291,608,800,100,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,428 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | static int append(uint8_t **dst, unsigned *dst_size, const unsigned char *src, unsigned src_size)
{
*dst = _asn1_realloc(*dst, *dst_size+src_size);
if (*dst == NULL)
return ASN1_MEM_ERROR;
memcpy(*dst + *dst_size, src, src_size);
*dst_size += src_size;
return ASN1_SUCCESS;
}
| 7,925,858,940,414,375,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,429 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
unsigned int _der_len, unsigned char **str,
unsigned int *str_len, unsigned int *ber_len)
{
int tag_len, len_len;
const unsigned char *p;
int der_len = _der_len;
uint8_t *total = NULL;
unsigned total_size = 0;
unsigned char class;
... | 264,729,959,019,482,450,000,000,000,000,000,000,000 | decoding.c | 642,843,291,608,800,100,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,430 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_der_decoding (asn1_node * element, const void *ider, int ider_len,
char *errorDescription)
{
return asn1_der_decoding2 (element, ider, &ider_len, 0, errorDescription);
}
| 160,989,817,426,092,780,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,431 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_der_decoding2 (asn1_node *element, const void *ider, int *max_ider_len,
unsigned int flags, char *errorDescription)
{
asn1_node node, p, p2, p3;
char temp[128];
int counter, len2, len3, len4, move, ris, tlen;
struct node_tail_cache_st tcache = {NULL, NULL};
unsigned char class;
unsigned long tag;... | 143,855,200,433,019,210,000,000,000,000,000,000,000 | decoding.c | 642,843,291,608,800,100,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,432 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_der_decoding_startEnd (asn1_node element, const void *ider, int ider_len,
const char *name_element, int *start, int *end)
{
asn1_node node, node_to_find;
int result = ASN1_DER_ERROR;
node = element;
if (node == NULL)
return ASN1_ELEMENT_NOT_FOUND;
node_to_find = asn1_find_node (node, name_e... | 328,010,339,990,133,460,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,433 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_expand_any_defined_by (asn1_node definitions, asn1_node * element)
{
char name[2 * ASN1_MAX_NAME_SIZE + 1],
value[ASN1_MAX_NAME_SIZE];
int retCode = ASN1_SUCCESS, result;
int len, len2, len3;
asn1_node p, p2, p3, aux = NULL;
char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE];
const char *defini... | 166,357,106,639,092,890,000,000,000,000,000,000,000 | decoding.c | 331,599,435,441,657,880,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,434 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_get_bit_der (const unsigned char *der, int der_len,
int *ret_len, unsigned char *str, int str_size,
int *bit_len)
{
int len_len = 0, len_byte;
if (der_len <= 0)
return ASN1_GENERIC_ERROR;
len_byte = asn1_get_length_der (der, der_len, &len_len) - 1;
if (len_byte < 0)
return ASN1_DER_ERROR;... | 198,268,823,654,364,370,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,435 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_get_length_ber (const unsigned char *ber, int ber_len, int *len)
{
int ret;
long err;
ret = asn1_get_length_der (ber, ber_len, len);
if (ret == -1)
{ /* indefinite length method */
err = _asn1_get_indefinite_length_string (ber + 1, ber_len, &ret);
if (err != ASN1_SUCCESS)
return -3;
... | 206,668,904,690,876,370,000,000,000,000,000,000,000 | decoding.c | 331,599,435,441,657,880,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,436 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_get_length_der (const unsigned char *der, int der_len, int *len)
{
unsigned int ans;
int k, punt, sum;
*len = 0;
if (der_len <= 0)
return 0;
if (!(der[0] & 128))
{
/* short form */
*len = 1;
ans = der[0];
}
else
{
/* Long form */
k = der[0] & 0x7F;
... | 258,290,668,184,208,920,000,000,000,000,000,000,000 | decoding.c | 331,599,435,441,657,880,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,437 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_get_object_id_der (const unsigned char *der, int der_len, int *ret_len,
char *str, int str_size)
{
int len_len, len, k;
int leading;
char temp[LTOSTR_MAX_SIZE];
unsigned long val, val1;
*ret_len = 0;
if (str && str_size > 0)
str[0] = 0; /* no oid */
if (str == NULL || der_len <= 0)
ret... | 163,545,435,459,524,120,000,000,000,000,000,000,000 | decoding.c | 642,843,291,608,800,100,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,438 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_get_octet_der (const unsigned char *der, int der_len,
int *ret_len, unsigned char *str, int str_size,
int *str_len)
{
int len_len = 0;
if (der_len <= 0)
return ASN1_GENERIC_ERROR;
*str_len = asn1_get_length_der (der, der_len, &len_len);
if (*str_len < 0)
return ASN1_DER_ERROR;
*re... | 284,498,329,338,785,800,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,439 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | asn1_get_tag_der (const unsigned char *der, int der_len,
unsigned char *cls, int *len, unsigned long *tag)
{
unsigned int ris;
int punt;
if (der == NULL || der_len < 2 || len == NULL)
return ASN1_DER_ERROR;
*cls = der[0] & 0xE0;
if ((der[0] & 0x1F) != 0x1F)
{
/* short form */
*len = ... | 193,292,705,684,466,800,000,000,000,000,000,000,000 | decoding.c | 331,599,435,441,657,880,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,440 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | extract_tag_der_recursive(asn1_node node, const unsigned char *der, int der_len,
int *ret_len, int *inner_len, unsigned flags)
{
asn1_node p;
int ris = ASN1_DER_ERROR;
if (type_field (node->type) == ASN1_ETYPE_CHOICE)
{
p = node->down;
while (p)
{
ris = _asn1_extract_tag_de... | 73,147,540,664,870,020,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,441 | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | None | 0 | get_octet_string (asn1_node node, const unsigned char *der, int der_len,
const unsigned char *tag, unsigned tag_len,
int *len, unsigned flags)
{
int len2, len3, counter, tot_len, indefinite;
int result;
int orig_der_len = der_len;
counter = 0;
if (tag[0] & ASN... | 303,995,844,389,038,240,000,000,000,000,000,000,000 | decoding.c | 642,843,291,608,800,100,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
17,442 | enlightment | ce94edca1ccfbe314cb7cd9453433fad404ec7ef | https://git.enlightenment.org/legacy/imlib2 | https://git.enlightenment.org/legacy/imlib2.git/commit/?id=ce94edca1ccfbe314cb7cd9453433fad404ec7ef | None | 0 | __imlib_AddUpdate(ImlibUpdate * u, int x, int y, int w, int h)
{
ImlibUpdate *nu;
if ((w < 1) || (h < 1) || ((x + w) < 1) || ((y + h) < 1))
return u;
nu = malloc(sizeof(ImlibUpdate));
nu->x = x;
nu->y = y;
nu->w = w;
nu->h = h;
nu->next = u;
return nu;
}
| 99,999,759,323,063,320,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-3993 | Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates. | https://nvd.nist.gov/vuln/detail/CVE-2016-3993 |
17,443 | enlightment | ce94edca1ccfbe314cb7cd9453433fad404ec7ef | https://git.enlightenment.org/legacy/imlib2 | https://git.enlightenment.org/legacy/imlib2.git/commit/?id=ce94edca1ccfbe314cb7cd9453433fad404ec7ef | None | 0 | __imlib_DupUpdates(ImlibUpdate * u)
{
ImlibUpdate *uu, *cu, *pu, *ru;
if (!u)
return NULL;
uu = malloc(sizeof(ImlibUpdate));
memcpy(uu, u, sizeof(ImlibUpdate));
cu = u->next;
pu = u;
ru = uu;
while (cu)
{
uu = malloc(sizeof(ImlibUpdate));
memcpy(uu, u, sizeof(... | 105,217,809,549,548,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-3993 | Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates. | https://nvd.nist.gov/vuln/detail/CVE-2016-3993 |
17,444 | enlightment | ce94edca1ccfbe314cb7cd9453433fad404ec7ef | https://git.enlightenment.org/legacy/imlib2 | https://git.enlightenment.org/legacy/imlib2.git/commit/?id=ce94edca1ccfbe314cb7cd9453433fad404ec7ef | None | 0 | __imlib_FreeUpdates(ImlibUpdate * u)
{
ImlibUpdate *uu;
uu = u;
while (uu)
{
u = uu;
uu = uu->next;
free(u);
}
}
| 243,680,166,261,065,570,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-3993 | Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates. | https://nvd.nist.gov/vuln/detail/CVE-2016-3993 |
17,448 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | _gnutls_compressed2ciphertext (gnutls_session_t session,
opaque * cipher_data, int cipher_size,
gnutls_datum_t compressed,
content_type_t _type, int random_pad,
record_parameters_st * params)
{
... | 329,545,795,474,065,240,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,449 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | _gnutls_decrypt (gnutls_session_t session, opaque * ciphertext,
size_t ciphertext_size, uint8_t * data,
size_t max_data_size, content_type_t type,
record_parameters_st * params)
{
gnutls_datum_t gtxt;
gnutls_datum_t gcipher;
int ret;
if (ciphertext_size == 0)
... | 255,329,791,418,753,540,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,450 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | _gnutls_encrypt (gnutls_session_t session, const opaque * headers,
size_t headers_size, const opaque * data,
size_t data_size, opaque * ciphertext,
size_t ciphertext_size, content_type_t type, int random_pad,
record_parameters_st * params)
{
gnutls_d... | 100,737,169,524,067,670,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,451 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | calc_enc_length (gnutls_session_t session, int data_size,
int hash_size, uint8_t * pad, int random_pad,
cipher_type_t block_algo, uint16_t blocksize)
{
uint8_t rnd;
int length, ret;
*pad = 0;
switch (block_algo)
{
case CIPHER_STREAM:
length = data_size + hash_si... | 311,939,694,108,620,900,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,452 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | is_read_comp_null (gnutls_session_t session)
{
record_parameters_st *record_params;
_gnutls_epoch_get (session, EPOCH_READ_CURRENT, &record_params);
if (record_params->compression_algorithm == GNUTLS_COMP_NULL)
return 0;
return 1;
}
| 288,688,383,027,880,740,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,453 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | is_write_comp_null (gnutls_session_t session)
{
record_parameters_st *record_params;
_gnutls_epoch_get (session, EPOCH_WRITE_CURRENT, &record_params);
if (record_params->compression_algorithm == GNUTLS_COMP_NULL)
return 0;
return 1;
}
| 78,978,526,404,870,010,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,454 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | mac_hash (digest_hd_st * td, void *data, int data_size, int ver)
{
if (ver == GNUTLS_SSL3)
{ /* SSL 3.0 */
_gnutls_hash (td, data, data_size);
}
else
{
_gnutls_hmac (td, data, data_size);
}
}
| 79,046,329,923,681,200,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,455 | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d | None | 0 | make_preamble (opaque * uint64_data, opaque type, uint16_t c_length,
opaque ver, opaque * preamble)
{
opaque minor = _gnutls_version_get_minor (ver);
opaque major = _gnutls_version_get_major (ver);
opaque *p = preamble;
memcpy (p, uint64_data, 8);
p += 8;
*p = type;
p++;
if (_gnutls_vers... | 250,271,560,483,612,970,000,000,000,000,000,000,000 | gnutls_cipher.c | 127,931,477,813,659,430,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
17,463 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | SourcePictureClassify (PicturePtr pict,
int x,
int y,
int width,
int height)
{
if (pict->pSourcePict->type == SourcePictTypeSolidFill)
{
pict->pSourcePict->solidFill.class = SourcePictClassHorizontal;
}
else if (pict->pSourcePict->type == SourcePictTypeLinear... | 150,743,398,207,788,300,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,464 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | _gradient_walker_reset (GradientWalker *walker,
xFixed_32_32 pos)
{
int32_t x, left_x, right_x;
xRenderColor *left_c, *right_c;
int n, count = walker->num_stops;
PictGradientStopPtr stops = walker->stops;
static co... | 260,012,673,698,773,500,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,465 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineAddC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width)
{
int i;
for (i = 0; i < width; ++i) {
CARD32 s = READ(src + i);
CARD32 m = READ(mask + i);
CARD32 d = READ(dest + i);
fbCombineMaskValueC (&s, &m);
FbByteAdd(d, s);
WRITE(dest + i, d);
}
}
| 219,344,617,560,410,680,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,466 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineAddU (CARD32 *dest, const CARD32 *src, int width)
{
int i;
for (i = 0; i < width; ++i) {
CARD32 s = READ(src + i);
CARD32 d = READ(dest + i);
FbByteAdd(d, s);
WRITE(dest + i, d);
}
}
| 333,595,003,708,718,280,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,467 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineAtopC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width)
{
int i;
for (i = 0; i < width; ++i) {
CARD32 d = READ(dest + i);
CARD32 s = READ(src + i);
CARD32 m = READ(mask + i);
CARD32 ad;
CARD16 as = d >> 24;
fbCombineMaskC (&s, &m);
ad = ~m;
... | 36,158,994,439,831,650,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,468 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineAtopReverseC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width)
{
int i;
for (i = 0; i < width; ++i) {
CARD32 d = READ(dest + i);
CARD32 s = READ(src + i);
CARD32 m = READ(mask + i);
CARD32 ad;
CARD16 as = ~d >> 24;
fbCombineMaskC (&s, &m);
ad = m;
... | 295,250,774,274,320,340,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,469 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineAtopReverseU (CARD32 *dest, const CARD32 *src, int width)
{
int i;
for (i = 0; i < width; ++i) {
CARD32 s = READ(src + i);
CARD32 d = READ(dest + i);
CARD32 src_a = Alpha(s);
CARD32 dest_ia = Alpha(~d);
FbByteAddMul(s, dest_ia, d, src_a);
WRITE(dest + i,... | 160,527,420,257,679,380,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,470 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineAtopU (CARD32 *dest, const CARD32 *src, int width)
{
int i;
for (i = 0; i < width; ++i) {
CARD32 s = READ(src + i);
CARD32 d = READ(dest + i);
CARD32 dest_a = Alpha(d);
CARD32 src_ia = Alpha(~s);
FbByteAddMul(s, dest_a, d, src_ia);
WRITE(dest + i, s);
... | 288,914,568,369,560,620,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,471 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineClear (CARD32 *dest, const CARD32 *src, int width)
{
MEMSET_WRAPPED(dest, 0, width*sizeof(CARD32));
}
| 205,606,510,895,945,630,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,472 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineClearC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width)
{
MEMSET_WRAPPED(dest, 0, width*sizeof(CARD32));
}
| 52,714,163,927,338,470,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,473 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineConjointAtopC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width)
{
fbCombineConjointGeneralC (dest, src, mask, width, CombineAAtop);
}
| 288,107,316,212,037,780,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,474 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineConjointAtopReverseC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width)
{
fbCombineConjointGeneralC (dest, src, mask, width, CombineBAtop);
}
| 20,675,884,064,724,308,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,475 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineConjointAtopReverseU (CARD32 *dest, const CARD32 *src, int width)
{
fbCombineConjointGeneralU (dest, src, width, CombineBAtop);
}
| 109,645,964,763,908,640,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
17,476 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 0 | fbCombineConjointAtopU (CARD32 *dest, const CARD32 *src, int width)
{
fbCombineConjointGeneralU (dest, src, width, CombineAAtop);
}
| 170,017,549,561,961,130,000,000,000,000,000,000,000 | fbcompose.c | 160,350,667,259,921,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.