idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
17,359
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
0
init_compress( compress_filter_context_t *zfx, z_stream *zs ) { int rc; int level; #if defined(__riscos__) && defined(USE_ZLIBRISCOS) static int zlib_initialized = 0; if (!zlib_initialized) zlib_initialized = riscos_load_module("ZLib", zlib_path, 1); #endif if( opt.compress_level >= 1 && ...
91,323,874,208,994,070,000,000,000,000,000,000,000
compress.c
48,334,665,728,577,810,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
17,360
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
0
init_uncompress( compress_filter_context_t *zfx, z_stream *zs ) { int rc; /**************** * PGP uses a windowsize of 13 bits. Using a negative value for * it forces zlib not to expect a zlib header. This is a * undocumented feature Peter Gutmann told me about. * * We must use 15...
28,135,867,284,964,923,000,000,000,000,000,000,000
compress.c
48,334,665,728,577,810,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
17,361
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
0
push_compress_filter(IOBUF out,compress_filter_context_t *zfx,int algo) { push_compress_filter2(out,zfx,algo,0); }
288,125,246,056,774,800,000,000,000,000,000,000,000
compress.c
48,334,665,728,577,810,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
17,362
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
0
push_compress_filter2(IOBUF out,compress_filter_context_t *zfx, int algo,int rel) { if(algo>=0) zfx->algo=algo; else zfx->algo=DEFAULT_COMPRESS_ALGO; switch(zfx->algo) { case COMPRESS_ALGO_NONE: break; case COMPRESS_ALGO_ZIP: case COMPRESS_ALGO_ZLIB: iobuf_push_filter...
167,987,471,267,118,120,000,000,000,000,000,000,000
compress.c
48,334,665,728,577,810,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
17,363
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
0
release_context (compress_filter_context_t *ctx) { xfree (ctx); }
147,127,971,884,654,500,000,000,000,000,000,000,000
compress.c
48,334,665,728,577,810,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
17,364
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static NTSTATUS check_guest_password(auth_serversupplied_info **server_info) { struct auth_context *auth_context; auth_usersupplied_info *user_info = NULL; NTSTATUS nt_status; unsigned char chal[8]; ZERO_STRUCT(chal); DEBUG(3,("Got anonymous request\n")); if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fi...
189,236,863,006,382,400,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,365
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static NTSTATUS check_spnego_blob_complete(struct smbd_server_connection *sconn, uint16 smbpid, uint16 vuid, DATA_BLOB *pblob) { struct pending_auth_data *pad = NULL; ASN1_DATA *data; size_t needed_len = 0; pad = get_pending_auth_data(sconn, smbpid); /* Ensure we have some data. */ if (pblob->le...
152,226,337,551,813,100,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,366
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static void delete_partial_auth(struct smbd_server_connection *sconn, struct pending_auth_data *pad) { if (!pad) { return; } DLIST_REMOVE(sconn->smb1.pd_list, pad); data_blob_free(&pad->partial_data); SAFE_FREE(pad); }
204,573,461,498,704,440,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,367
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static NTSTATUS do_map_to_guest(NTSTATUS status, auth_serversupplied_info **server_info, const char *user, const char *domain) { if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) { if ((lp_map_to_guest() == MAP_TO_GUEST_ON_BAD_USER) || (lp_map_to_guest() == MAP_TO_GUEST_ON_BAD_PASSWORD)) { DEBUG(...
313,401,748,220,854,550,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,368
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static struct pending_auth_data *get_pending_auth_data( struct smbd_server_connection *sconn, uint16_t smbpid) { struct pending_auth_data *pad; /* * NOTE: using the smbpid here is completely wrong... * see [MS-SMB] * 3.3.5.3 Receiving an SMB_COM_SESSION_SETUP_ANDX Request */ for (pad = sconn->smb1...
323,763,986,210,043,640,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,369
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
NTSTATUS parse_spnego_mechanisms(DATA_BLOB blob_in, DATA_BLOB *pblob_out, char **kerb_mechOID) { char *OIDs[ASN1_MAX_OIDS]; int i; NTSTATUS ret = NT_STATUS_OK; *kerb_mechOID = NULL; /* parse out the OIDs and the first sec blob */ if (!parse_negTokenTarg(blob_in, OIDs, pblob_out)) { return NT_STATUS_LOGON_...
152,980,675,609,072,820,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,370
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static int push_signature(uint8 **outbuf) { char *lanman; int result, tmp; result = 0; tmp = message_push_string(outbuf, "Unix", STR_TERMINATE); if (tmp == -1) return -1; result += tmp; if (asprintf(&lanman, "Samba %s", samba_version_string()) != -1) { tmp = message_push_string(outbuf, lanman, STR_TERMINAT...
245,540,837,454,357,400,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,371
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
void reply_sesssetup_and_X(struct smb_request *req) { int sess_vuid; int smb_bufsize; DATA_BLOB lm_resp; DATA_BLOB nt_resp; DATA_BLOB plaintext_password; char *tmp; const char *user; fstring sub_user; /* Sainitised username for substituion */ const char *domain; const char *native_os; const char *native_lanm...
142,160,603,849,879,590,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,372
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static void reply_sesssetup_blob(struct smb_request *req, DATA_BLOB blob, NTSTATUS nt_status) { if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { reply_nterror(req, nt_status_squash(nt_status)); return; } nt_status = nt_status_squash(nt_status);...
250,578,620,099,327,700,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,373
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static void reply_spnego_auth(struct smb_request *req, uint16 vuid, DATA_BLOB blob1, AUTH_NTLMSSP_STATE **auth_ntlmssp_state) { DATA_BLOB auth = data_blob_null; DATA_BLOB auth_reply = data_blob_null; DATA_BLOB secblob = data_blob_null; NTSTATUS status = NT_STATUS_LOGON_FAILURE; struct sm...
221,925,765,565,388,000,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,374
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static void reply_spnego_kerberos(struct smb_request *req, DATA_BLOB *secblob, const char *mechOID, uint16 vuid, bool *p_invalidate_vuid) { TALLOC_CTX *mem_ctx; DATA_BLOB ticket; char *client, *p, *domain; fstring netbios_domain_name; struct passwd *pw; fstring user; int sess_vuid = req->...
105,551,098,846,521,000,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,375
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static void reply_spnego_negotiate(struct smb_request *req, uint16 vuid, DATA_BLOB blob1, AUTH_NTLMSSP_STATE **auth_ntlmssp_state) { DATA_BLOB secblob; DATA_BLOB chal; char *kerb_mech = NULL; NTSTATUS status; struct smbd_server_connection *sconn = smbd_server_conn; status = parse_spnego_mech...
20,402,828,506,819,645,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,376
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static void reply_spnego_ntlmssp(struct smb_request *req, uint16 vuid, AUTH_NTLMSSP_STATE **auth_ntlmssp_state, DATA_BLOB *ntlmssp_blob, NTSTATUS nt_status, const char *OID, bool wrap) { DATA_BLOB response; struct auth_serversupplied_info *server_info = NULL; struct smbd_server_connection *s...
165,573,686,735,451,130,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,377
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static void setup_new_vc_session(void) { char addr[INET6_ADDRSTRLEN]; DEBUG(2,("setup_new_vc_session: New VC == 0, if NT4.x " "compatible we would close all old resources.\n")); #if 0 conn_close_all(); invalidate_all_vuids(); #endif if (lp_reset_on_zero_vc()) { connections_forall(shutdown_other_smbds, CONS...
141,169,101,653,222,840,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,378
samba
9280051bfba337458722fb157f3082f93cbd9f2b
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=9280051bfba337458722fb157f3082f93cbd9f2b
s3: Fix an uninitialized variable read Found by Laurent Gaffie <laurent.gaffie@gmail.com> Thanks for that, Volker Fix bug #7254 (An uninitialized variable read could cause an smbd crash).
0
static int shutdown_other_smbds(struct db_record *rec, const struct connections_key *key, const struct connections_data *crec, void *private_data) { const char *ip = (const char *)private_data; if (!process_exists(crec->pid)) { return 0; } if (procid_is_me(&crec->pid)) { return 0; } if (strcmp(...
44,862,978,662,407,410,000,000,000,000,000,000,000
sesssetup.c
54,377,162,305,834,695,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
https://nvd.nist.gov/vuln/detail/CVE-2010-1642
17,379
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
void add_to_common_flags2(uint32 v) { common_flags2 |= v; }
107,596,909,198,093,110,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,380
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
NTSTATUS allow_new_trans(struct trans_state *list, int mid) { int count = 0; for (; list != NULL; list = list->next) { if (list->mid == mid) { return NT_STATUS_INVALID_PARAMETER; } count += 1; } if (count > 5) { return NT_STATUS_INSUFFICIENT_RESOURCES; } return NT_STATUS_OK; }
52,675,210,491,839,870,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,381
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void construct_reply(char *inbuf, int size, size_t unread_bytes, uint32_t seqnum, bool encrypted, struct smb_perfcount_data *deferred_pcd) { connection_struct *conn; struct smb_request *req; if (!(req = talloc(talloc_tos(), struct smb_request))) { smb_panic("could not allocate smb_request"); ...
155,512,300,356,413,710,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,382
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
void construct_reply_common_req(struct smb_request *req, char *outbuf) { construct_reply_common(req, (char *)req->inbuf, outbuf); }
322,339,024,073,642,400,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,383
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool create_outbuf(TALLOC_CTX *mem_ctx, struct smb_request *req, const char *inbuf, char **outbuf, uint8_t num_words, uint32_t num_bytes) { /* * Protect against integer wrap */ if ((num_bytes > 0xffffff) || ((num_bytes + smb_size + num_words*2) > 0xffffff)) { char *msg; if ...
19,520,717,218,285,001,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,384
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool deadtime_fn(const struct timeval *now, void *private_data) { struct smbd_server_connection *sconn = smbd_server_conn; if ((conn_num_open(sconn) == 0) || (conn_idle_all(sconn, now->tv_sec))) { DEBUG( 2, ( "Closing idle connection\n" ) ); messaging_send(smbd_messaging_context(), procid_self(), ...
127,829,656,513,201,030,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,385
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
struct idle_event *event_add_idle(struct event_context *event_ctx, TALLOC_CTX *mem_ctx, struct timeval interval, const char *name, bool (*handler)(const struct timeval *now, void *private_data), void *private_data) { struct idle_event *result; struct timeval now = timeval_current...
184,034,130,308,515,870,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,386
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool find_andx_cmd_ofs(uint8_t *buf, size_t *pofs) { uint8_t cmd; size_t ofs; cmd = CVAL(buf, smb_com); SMB_ASSERT(is_andx_req(cmd)); ofs = smb_vwv0; while (CVAL(buf, ofs) != 0xff) { if (!is_andx_req(CVAL(buf, ofs))) { return false; } /* * ofs is from start of smb header, so add the 4 len...
266,819,440,988,725,830,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,387
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void fixup_chain_error_packet(struct smb_request *req) { uint8_t *outbuf = req->outbuf; req->outbuf = NULL; reply_outbuf(req, 2, 0); memcpy(req->outbuf, outbuf, smb_wct); TALLOC_FREE(outbuf); SCVAL(req->outbuf, smb_vwv0, 0xff); }
238,684,550,095,012,450,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,388
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool housekeeping_fn(const struct timeval *now, void *private_data) { change_to_root_user(); /* update printer queue caches if necessary */ update_monitored_printq_cache(); /* check if we need to reload services */ check_reload(time(NULL)); /* Change machine password if neccessary. */ attempt_machine_p...
12,092,007,857,613,825,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,389
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void init_smb_request(struct smb_request *req, const uint8 *inbuf, size_t unread_bytes, bool encrypted, uint32_t seqnum) { struct smbd_server_connection *sconn = smbd_server_conn; size_t req_size = smb_len(inbuf) + 4; /* Ensure we have at least smb_size bytes. */ if (req_size < smb_size) { ...
289,162,821,435,465,600,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,390
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool keepalive_fn(const struct timeval *now, void *private_data) { if (!send_keepalive(smbd_server_fd())) { DEBUG( 2, ( "Keepalive failed - exiting.\n" ) ); return False; } return True; }
331,263,621,839,171,660,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,391
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
bool open_was_deferred(uint16 mid) { struct pending_message_list *pml; for (pml = deferred_open_queue; pml; pml = pml->next) { if (SVAL(pml->buf.data,smb_mid) == mid && !pml->processed) { return True; } } return False; }
56,578,889,719,442,870,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,392
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void process_smb(struct smbd_server_connection *conn, uint8_t *inbuf, size_t nread, size_t unread_bytes, uint32_t seqnum, bool encrypted, struct smb_perfcount_data *deferred_pcd) { int msg_type = CVAL(inbuf,0); DO_PROFILE_INC(smb_count); DEBUG( 6, ( "got message type 0x%x of len 0x%x\n", msg_type, ...
168,542,368,584,421,850,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,393
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
bool push_deferred_smb_message(struct smb_request *req, struct timeval request_time, struct timeval timeout, char *private_data, size_t priv_len) { struct timeval end_time; if (req->unread_bytes) { DEBUG(0,("push_deferred_smb_message: logic error ! " "unread_bytes = %u\n", (unsi...
202,311,682,391,703,530,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,394
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool push_queued_message(struct smb_request *req, struct timeval request_time, struct timeval end_time, char *private_data, size_t private_len) { int msg_len = smb_len(req->inbuf) + 4; struct pending_message_list *msg; msg = TALLOC_ZERO_P(NULL, struct pending_message_list); if(msg == NULL) { ...
230,595,747,573,409,600,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,395
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static NTSTATUS read_packet_remainder(int fd, char *buffer, unsigned int timeout, ssize_t len) { if (len <= 0) { return NT_STATUS_OK; } return read_fd_with_timeout(fd, buffer, len, len, timeout, NULL); }
61,802,208,335,441,040,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,396
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static NTSTATUS receive_smb_raw_talloc(TALLOC_CTX *mem_ctx, int fd, char **buffer, unsigned int timeout, size_t *p_unread, size_t *plen) { char lenbuf[4]; size_t len; int min_recv_size = lp_min_receive_file_size(); NTSTATUS status; *p_unread = 0; status = read_smb_length_return_keepalive(f...
144,050,946,382,005,000,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,397
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static NTSTATUS receive_smb_raw_talloc_partial_read(TALLOC_CTX *mem_ctx, const char lenbuf[4], int fd, char **buffer, unsigned int timeout, size_t *p_unread, size_t *len_ret) { /* Size of a WRITEX call (+4 byte len). */ char writeX_header[4 + STANDARD_WRITE_AND_X_HEAD...
3,582,969,447,860,865,400,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,398
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx, int fd, char **buffer, unsigned int timeout, size_t *p_unread, bool *p_encrypted, size_t *p_len, uint32_t *seqnum) { size_t len = 0; NTSTATUS status; *p_encrypted = false; status = receive_smb_raw_talloc(mem_ctx, fd, buffer, timeo...
103,265,340,987,524,620,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,399
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
void remove_from_common_flags2(uint32 v) { common_flags2 &= ~v; }
130,158,997,320,013,220,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,400
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
bool req_is_in_chain(struct smb_request *req) { if (req->vwv != (uint16_t *)(req->inbuf+smb_vwv)) { /* * We're right now handling a subsequent request, so we must * be in a chain */ return true; } if (!is_andx_req(req->cmd)) { return false; } if (req->wct < 2) { /* * Okay, an illegal request,...
156,889,636,207,598,480,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,401
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
size_t req_wct_ofs(struct smb_request *req) { size_t buf_size; if (req->chain_outbuf == NULL) { return smb_wct - 4; } buf_size = talloc_get_size(req->chain_outbuf); if ((buf_size % 4) != 0) { buf_size += (4 - (buf_size % 4)); } return buf_size - 4; }
97,733,356,894,371,470,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,402
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
void schedule_deferred_open_smb_message(uint16 mid) { struct pending_message_list *pml; int i = 0; for (pml = deferred_open_queue; pml; pml = pml->next) { uint16 msg_mid = SVAL(pml->buf.data,smb_mid); DEBUG(10,("schedule_deferred_open_smb_message: [%d] msg_mid = %u\n", i++, (unsigned int)msg_mid )); if (...
58,637,565,427,185,000,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,403
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void smb_dump(const char *name, int type, const char *data, ssize_t len) { int fd, i; char *fname = NULL; if (DEBUGLEVEL < 50) { return; } if (len < 4) len = smb_len(data)+4; for (i=1;i<100;i++) { if (asprintf(&fname, "/tmp/%s.%d.%s", name, i, type ? "req" : "resp") == -1) { return; } f...
269,721,852,740,914,920,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,404
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
const char *smb_fn_name(int type) { const char *unknown_name = "SMBunknown"; if (smb_messages[type].name == NULL) return(unknown_name); return(smb_messages[type].name); }
280,718,247,936,011,000,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,405
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool smb_splice_chain(uint8_t **poutbuf, uint8_t smb_command, uint8_t wct, const uint16_t *vwv, size_t bytes_alignment, uint32_t num_bytes, const uint8_t *bytes) { uint8_t *outbuf; size_t old_size, new_size; size_t ofs; size_t chain_padding = 0; size_t bytes_padding = 0; bool first_...
133,997,285,206,231,840,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,406
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void smbd_deferred_open_timer(struct event_context *ev, struct timed_event *te, struct timeval _tval, void *private_data) { struct pending_message_list *msg = talloc_get_type(private_data, struct pending_message_list); TALLOC_CTX *mem_ctx = talloc_tos(); uint16_t mid = SVAL(...
23,372,852,576,104,340,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,407
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void smbd_idle_event_handler(struct event_context *ctx, struct timed_event *te, struct timeval now, void *private_data) { struct idle_event *event = talloc_get_type_abort(private_data, struct idle_event); TALLOC_FREE(event->te); DEBUG(10,("smbd_idle_event_handler: %s %p called\n", ...
170,368,658,635,728,760,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,408
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
void smbd_process(void) { TALLOC_CTX *frame = talloc_stackframe(); char remaddr[INET6_ADDRSTRLEN]; if (lp_maxprotocol() == PROTOCOL_SMB2 && lp_security() != SEC_SHARE) { smbd_server_conn->allow_smb2 = true; } /* Ensure child is set to blocking mode */ set_blocking(smbd_server_fd(),True); set_socket_opt...
209,497,853,873,040,500,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,409
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static NTSTATUS smbd_server_connection_loop_once(struct smbd_server_connection *conn) { fd_set r_fds, w_fds; int selrtn; struct timeval to; int maxfd = 0; to.tv_sec = SMBD_SELECT_TIMEOUT; to.tv_usec = 0; /* * Setup the select fd sets. */ FD_ZERO(&r_fds); FD_ZERO(&w_fds); /* * Are there any timed eve...
151,730,470,542,846,200,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,410
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
void smbd_setup_sig_hup_handler(void) { struct tevent_signal *se; se = tevent_add_signal(smbd_event_context(), smbd_event_context(), SIGHUP, 0, smbd_sig_hup_handler, NULL); if (!se) { exit_server("failed to setup SIGHUP handler"); } }
75,234,412,221,575,320,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,411
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
void smbd_setup_sig_term_handler(void) { struct tevent_signal *se; se = tevent_add_signal(smbd_event_context(), smbd_event_context(), SIGTERM, 0, smbd_sig_term_handler, NULL); if (!se) { exit_server("failed to setup SIGTERM handler"); } }
182,427,833,898,082,900,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,412
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void smbd_sig_hup_handler(struct tevent_context *ev, struct tevent_signal *se, int signum, int count, void *siginfo, void *private_data) { change_to_root_user(); DEBUG(1,("Reloading services after SIGHUP\n")); reload_services(False); }
133,521,084,978,428,300,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,413
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static void smbd_sig_term_handler(struct tevent_context *ev, struct tevent_signal *se, int signum, int count, void *siginfo, void *private_data) { exit_server_cleanly("termination signal"); }
196,967,209,037,801,360,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,414
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
bool srv_send_smb(int fd, char *buffer, bool do_signing, uint32_t seqnum, bool do_encrypt, struct smb_perfcount_data *pcd) { size_t len = 0; size_t nwritten=0; ssize_t ret; char *buf_out = buffer; if (do_signing) { /* Sign the outgoing packet if required. */ srv_calculate_sign_mac(smbd_server_conn...
10,043,787,984,829,753,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,415
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
int srv_set_message(char *buf, int num_words, int num_bytes, bool zero) { if (zero && (num_words || num_bytes)) { memset(buf + smb_size,'\0',num_words*2 + num_bytes); } SCVAL(buf,smb_wct,num_words); SSVAL(buf,smb_vwv + num_words*SIZEOFWORD,nu...
41,859,469,342,677,930,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,416
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static connection_struct *switch_message(uint8 type, struct smb_request *req, int size) { int flags; uint16 session_tag; connection_struct *conn = NULL; struct smbd_server_connection *sconn = smbd_server_conn; errno = 0; /* Make sure this is an SMB packet. smb_size contains NetBIOS header * so subtract 4 from...
301,278,926,909,420,850,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,417
samba
25452a2268ac7013da28125f3df22085139af12d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=25452a2268ac7013da28125f3df22085139af12d
s3: Fix a NULL pointer dereference Found by Laurent Gaffie <laurent.gaffie@gmail.com>. Thanks! Volker
0
static bool valid_smb_header(const uint8_t *inbuf) { if (is_encrypted_packet(inbuf)) { return true; } /* * This used to be (strncmp(smb_base(inbuf),"\377SMB",4) == 0) * but it just looks weird to call strncmp for this one. */ return (IVAL(smb_base(inbuf), 0) == 0x424D53FF); }
259,660,569,013,103,200,000,000,000,000,000,000,000
process.c
86,125,744,420,152,730,000,000,000,000,000,000,000
[]
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 f...
https://nvd.nist.gov/vuln/detail/CVE-2010-1635
17,426
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
_asn1_get_indefinite_length_string (const unsigned char *der, int der_len, int *len) { int len2, len3, counter, indefinite; int result; unsigned long tag; unsigned char class; counter = indefinite = 0; while (1) { if (HAVE_TWO(der_len) && (der[counter] == 0) && (der[counter + 1] == 0)) ...
171,226,228,192,427,360,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,427
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
_asn1_get_time_der (unsigned type, const unsigned char *der, int der_len, int *ret_len, char *str, int str_size, unsigned flags) { int len_len, str_len; unsigned i; unsigned sign_count = 0; unsigned dot_count = 0; const unsigned char *p; if (der_len <= 0 || str == NULL) return ASN1_DER_ERROR; ...
70,860,900,718,300,860,000,000,000,000,000,000,000
decoding.c
642,843,291,608,800,100,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,428
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
static int append(uint8_t **dst, unsigned *dst_size, const unsigned char *src, unsigned src_size) { *dst = _asn1_realloc(*dst, *dst_size+src_size); if (*dst == NULL) return ASN1_MEM_ERROR; memcpy(*dst + *dst_size, src, src_size); *dst_size += src_size; return ASN1_SUCCESS; }
7,925,858,940,414,375,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,429
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_decode_simple_ber (unsigned int etype, const unsigned char *der, unsigned int _der_len, unsigned char **str, unsigned int *str_len, unsigned int *ber_len) { int tag_len, len_len; const unsigned char *p; int der_len = _der_len; uint8_t *total = NULL; unsigned total_size = 0; unsigned char class; ...
264,729,959,019,482,450,000,000,000,000,000,000,000
decoding.c
642,843,291,608,800,100,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,430
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_der_decoding (asn1_node * element, const void *ider, int ider_len, char *errorDescription) { return asn1_der_decoding2 (element, ider, &ider_len, 0, errorDescription); }
160,989,817,426,092,780,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,431
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_der_decoding2 (asn1_node *element, const void *ider, int *max_ider_len, unsigned int flags, char *errorDescription) { asn1_node node, p, p2, p3; char temp[128]; int counter, len2, len3, len4, move, ris, tlen; struct node_tail_cache_st tcache = {NULL, NULL}; unsigned char class; unsigned long tag;...
143,855,200,433,019,210,000,000,000,000,000,000,000
decoding.c
642,843,291,608,800,100,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,432
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_der_decoding_startEnd (asn1_node element, const void *ider, int ider_len, const char *name_element, int *start, int *end) { asn1_node node, node_to_find; int result = ASN1_DER_ERROR; node = element; if (node == NULL) return ASN1_ELEMENT_NOT_FOUND; node_to_find = asn1_find_node (node, name_e...
328,010,339,990,133,460,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,433
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_expand_any_defined_by (asn1_node definitions, asn1_node * element) { char name[2 * ASN1_MAX_NAME_SIZE + 1], value[ASN1_MAX_NAME_SIZE]; int retCode = ASN1_SUCCESS, result; int len, len2, len3; asn1_node p, p2, p3, aux = NULL; char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE]; const char *defini...
166,357,106,639,092,890,000,000,000,000,000,000,000
decoding.c
331,599,435,441,657,880,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,434
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_get_bit_der (const unsigned char *der, int der_len, int *ret_len, unsigned char *str, int str_size, int *bit_len) { int len_len = 0, len_byte; if (der_len <= 0) return ASN1_GENERIC_ERROR; len_byte = asn1_get_length_der (der, der_len, &len_len) - 1; if (len_byte < 0) return ASN1_DER_ERROR;...
198,268,823,654,364,370,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,435
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_get_length_ber (const unsigned char *ber, int ber_len, int *len) { int ret; long err; ret = asn1_get_length_der (ber, ber_len, len); if (ret == -1) { /* indefinite length method */ err = _asn1_get_indefinite_length_string (ber + 1, ber_len, &ret); if (err != ASN1_SUCCESS) return -3; ...
206,668,904,690,876,370,000,000,000,000,000,000,000
decoding.c
331,599,435,441,657,880,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,436
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_get_length_der (const unsigned char *der, int der_len, int *len) { unsigned int ans; int k, punt, sum; *len = 0; if (der_len <= 0) return 0; if (!(der[0] & 128)) { /* short form */ *len = 1; ans = der[0]; } else { /* Long form */ k = der[0] & 0x7F; ...
258,290,668,184,208,920,000,000,000,000,000,000,000
decoding.c
331,599,435,441,657,880,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,437
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_get_object_id_der (const unsigned char *der, int der_len, int *ret_len, char *str, int str_size) { int len_len, len, k; int leading; char temp[LTOSTR_MAX_SIZE]; unsigned long val, val1; *ret_len = 0; if (str && str_size > 0) str[0] = 0; /* no oid */ if (str == NULL || der_len <= 0) ret...
163,545,435,459,524,120,000,000,000,000,000,000,000
decoding.c
642,843,291,608,800,100,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,438
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_get_octet_der (const unsigned char *der, int der_len, int *ret_len, unsigned char *str, int str_size, int *str_len) { int len_len = 0; if (der_len <= 0) return ASN1_GENERIC_ERROR; *str_len = asn1_get_length_der (der, der_len, &len_len); if (*str_len < 0) return ASN1_DER_ERROR; *re...
284,498,329,338,785,800,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,439
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
asn1_get_tag_der (const unsigned char *der, int der_len, unsigned char *cls, int *len, unsigned long *tag) { unsigned int ris; int punt; if (der == NULL || der_len < 2 || len == NULL) return ASN1_DER_ERROR; *cls = der[0] & 0xE0; if ((der[0] & 0x1F) != 0x1F) { /* short form */ *len = ...
193,292,705,684,466,800,000,000,000,000,000,000,000
decoding.c
331,599,435,441,657,880,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,440
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
extract_tag_der_recursive(asn1_node node, const unsigned char *der, int der_len, int *ret_len, int *inner_len, unsigned flags) { asn1_node p; int ris = ASN1_DER_ERROR; if (type_field (node->type) == ASN1_ETYPE_CHOICE) { p = node->down; while (p) { ris = _asn1_extract_tag_de...
73,147,540,664,870,020,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,441
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
None
0
get_octet_string (asn1_node node, const unsigned char *der, int der_len, const unsigned char *tag, unsigned tag_len, int *len, unsigned flags) { int len2, len3, counter, tot_len, indefinite; int result; int orig_der_len = der_len; counter = 0; if (tag[0] & ASN...
303,995,844,389,038,240,000,000,000,000,000,000,000
decoding.c
642,843,291,608,800,100,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
17,442
enlightment
ce94edca1ccfbe314cb7cd9453433fad404ec7ef
https://git.enlightenment.org/legacy/imlib2
https://git.enlightenment.org/legacy/imlib2.git/commit/?id=ce94edca1ccfbe314cb7cd9453433fad404ec7ef
None
0
__imlib_AddUpdate(ImlibUpdate * u, int x, int y, int w, int h) { ImlibUpdate *nu; if ((w < 1) || (h < 1) || ((x + w) < 1) || ((y + h) < 1)) return u; nu = malloc(sizeof(ImlibUpdate)); nu->x = x; nu->y = y; nu->w = w; nu->h = h; nu->next = u; return nu; }
99,999,759,323,063,320,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-3993
Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates.
https://nvd.nist.gov/vuln/detail/CVE-2016-3993
17,443
enlightment
ce94edca1ccfbe314cb7cd9453433fad404ec7ef
https://git.enlightenment.org/legacy/imlib2
https://git.enlightenment.org/legacy/imlib2.git/commit/?id=ce94edca1ccfbe314cb7cd9453433fad404ec7ef
None
0
__imlib_DupUpdates(ImlibUpdate * u) { ImlibUpdate *uu, *cu, *pu, *ru; if (!u) return NULL; uu = malloc(sizeof(ImlibUpdate)); memcpy(uu, u, sizeof(ImlibUpdate)); cu = u->next; pu = u; ru = uu; while (cu) { uu = malloc(sizeof(ImlibUpdate)); memcpy(uu, u, sizeof(...
105,217,809,549,548,930,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-3993
Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates.
https://nvd.nist.gov/vuln/detail/CVE-2016-3993
17,444
enlightment
ce94edca1ccfbe314cb7cd9453433fad404ec7ef
https://git.enlightenment.org/legacy/imlib2
https://git.enlightenment.org/legacy/imlib2.git/commit/?id=ce94edca1ccfbe314cb7cd9453433fad404ec7ef
None
0
__imlib_FreeUpdates(ImlibUpdate * u) { ImlibUpdate *uu; uu = u; while (uu) { u = uu; uu = uu->next; free(u); } }
243,680,166,261,065,570,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-3993
Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates.
https://nvd.nist.gov/vuln/detail/CVE-2016-3993
17,448
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
_gnutls_compressed2ciphertext (gnutls_session_t session, opaque * cipher_data, int cipher_size, gnutls_datum_t compressed, content_type_t _type, int random_pad, record_parameters_st * params) { ...
329,545,795,474,065,240,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,449
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
_gnutls_decrypt (gnutls_session_t session, opaque * ciphertext, size_t ciphertext_size, uint8_t * data, size_t max_data_size, content_type_t type, record_parameters_st * params) { gnutls_datum_t gtxt; gnutls_datum_t gcipher; int ret; if (ciphertext_size == 0) ...
255,329,791,418,753,540,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,450
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
_gnutls_encrypt (gnutls_session_t session, const opaque * headers, size_t headers_size, const opaque * data, size_t data_size, opaque * ciphertext, size_t ciphertext_size, content_type_t type, int random_pad, record_parameters_st * params) { gnutls_d...
100,737,169,524,067,670,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,451
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
calc_enc_length (gnutls_session_t session, int data_size, int hash_size, uint8_t * pad, int random_pad, cipher_type_t block_algo, uint16_t blocksize) { uint8_t rnd; int length, ret; *pad = 0; switch (block_algo) { case CIPHER_STREAM: length = data_size + hash_si...
311,939,694,108,620,900,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,452
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
is_read_comp_null (gnutls_session_t session) { record_parameters_st *record_params; _gnutls_epoch_get (session, EPOCH_READ_CURRENT, &record_params); if (record_params->compression_algorithm == GNUTLS_COMP_NULL) return 0; return 1; }
288,688,383,027,880,740,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,453
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
is_write_comp_null (gnutls_session_t session) { record_parameters_st *record_params; _gnutls_epoch_get (session, EPOCH_WRITE_CURRENT, &record_params); if (record_params->compression_algorithm == GNUTLS_COMP_NULL) return 0; return 1; }
78,978,526,404,870,010,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,454
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
mac_hash (digest_hd_st * td, void *data, int data_size, int ver) { if (ver == GNUTLS_SSL3) { /* SSL 3.0 */ _gnutls_hash (td, data, data_size); } else { _gnutls_hmac (td, data, data_size); } }
79,046,329,923,681,200,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,455
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commit;h=422214868061370aeeb0ac9cd0f021a5c350a57d
None
0
make_preamble (opaque * uint64_data, opaque type, uint16_t c_length, opaque ver, opaque * preamble) { opaque minor = _gnutls_version_get_minor (ver); opaque major = _gnutls_version_get_major (ver); opaque *p = preamble; memcpy (p, uint64_data, 8); p += 8; *p = type; p++; if (_gnutls_vers...
250,271,560,483,612,970,000,000,000,000,000,000,000
gnutls_cipher.c
127,931,477,813,659,430,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
17,463
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
SourcePictureClassify (PicturePtr pict, int x, int y, int width, int height) { if (pict->pSourcePict->type == SourcePictTypeSolidFill) { pict->pSourcePict->solidFill.class = SourcePictClassHorizontal; } else if (pict->pSourcePict->type == SourcePictTypeLinear...
150,743,398,207,788,300,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,464
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
_gradient_walker_reset (GradientWalker *walker, xFixed_32_32 pos) { int32_t x, left_x, right_x; xRenderColor *left_c, *right_c; int n, count = walker->num_stops; PictGradientStopPtr stops = walker->stops; static co...
260,012,673,698,773,500,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,465
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineAddC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width) { int i; for (i = 0; i < width; ++i) { CARD32 s = READ(src + i); CARD32 m = READ(mask + i); CARD32 d = READ(dest + i); fbCombineMaskValueC (&s, &m); FbByteAdd(d, s); WRITE(dest + i, d); } }
219,344,617,560,410,680,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,466
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineAddU (CARD32 *dest, const CARD32 *src, int width) { int i; for (i = 0; i < width; ++i) { CARD32 s = READ(src + i); CARD32 d = READ(dest + i); FbByteAdd(d, s); WRITE(dest + i, d); } }
333,595,003,708,718,280,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,467
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineAtopC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width) { int i; for (i = 0; i < width; ++i) { CARD32 d = READ(dest + i); CARD32 s = READ(src + i); CARD32 m = READ(mask + i); CARD32 ad; CARD16 as = d >> 24; fbCombineMaskC (&s, &m); ad = ~m; ...
36,158,994,439,831,650,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,468
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineAtopReverseC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width) { int i; for (i = 0; i < width; ++i) { CARD32 d = READ(dest + i); CARD32 s = READ(src + i); CARD32 m = READ(mask + i); CARD32 ad; CARD16 as = ~d >> 24; fbCombineMaskC (&s, &m); ad = m; ...
295,250,774,274,320,340,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,469
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineAtopReverseU (CARD32 *dest, const CARD32 *src, int width) { int i; for (i = 0; i < width; ++i) { CARD32 s = READ(src + i); CARD32 d = READ(dest + i); CARD32 src_a = Alpha(s); CARD32 dest_ia = Alpha(~d); FbByteAddMul(s, dest_ia, d, src_a); WRITE(dest + i,...
160,527,420,257,679,380,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,470
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineAtopU (CARD32 *dest, const CARD32 *src, int width) { int i; for (i = 0; i < width; ++i) { CARD32 s = READ(src + i); CARD32 d = READ(dest + i); CARD32 dest_a = Alpha(d); CARD32 src_ia = Alpha(~s); FbByteAddMul(s, dest_a, d, src_ia); WRITE(dest + i, s); ...
288,914,568,369,560,620,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,471
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineClear (CARD32 *dest, const CARD32 *src, int width) { MEMSET_WRAPPED(dest, 0, width*sizeof(CARD32)); }
205,606,510,895,945,630,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,472
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineClearC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width) { MEMSET_WRAPPED(dest, 0, width*sizeof(CARD32)); }
52,714,163,927,338,470,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,473
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineConjointAtopC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width) { fbCombineConjointGeneralC (dest, src, mask, width, CombineAAtop); }
288,107,316,212,037,780,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,474
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineConjointAtopReverseC (CARD32 *dest, CARD32 *src, CARD32 *mask, int width) { fbCombineConjointGeneralC (dest, src, mask, width, CombineBAtop); }
20,675,884,064,724,308,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,475
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineConjointAtopReverseU (CARD32 *dest, const CARD32 *src, int width) { fbCombineConjointGeneralU (dest, src, width, CombineBAtop); }
109,645,964,763,908,640,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166
17,476
xserver
d2f813f7db157fc83abc4b3726821c36ee7e40b1
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
New fbWalkCompositeRegion() function This new function walks the composite region and calls a rectangle compositing function on each compositing rectangle. Previously there were buggy duplicates of this code in fbcompose.c and miext/rootles/safealpha/safeAlphaPicture.c.
0
fbCombineConjointAtopU (CARD32 *dest, const CARD32 *src, int width) { fbCombineConjointGeneralU (dest, src, width, CombineAAtop); }
170,017,549,561,961,130,000,000,000,000,000,000,000
fbcompose.c
160,350,667,259,921,810,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-1166
The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
https://nvd.nist.gov/vuln/detail/CVE-2010-1166