idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
17,773 | openssl | 08229ad838c50f644d7e928e2eef147b4308ad64 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64 | Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
An attack is simple, if the first CMS_recipientInfo is valid but the
second CMS_recipientInfo is chosen ciphertext. If the second
recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
encryption key will be replaced by garbage, and the mess... | 0 | static BIO *cms_get_text_bio(BIO *out, unsigned int flags)
{
BIO *rbio;
if (out == NULL)
rbio = BIO_new(BIO_s_null());
else if (flags & CMS_TEXT) {
rbio = BIO_new(BIO_s_mem());
BIO_set_mem_eof_return(rbio, 0);
} else
rbio = out;
return rbio;
}
| 108,305,789,512,885,530,000,000,000,000,000,000,000 | None | null | [
"CWE-311"
] | CVE-2019-1563 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key... | https://nvd.nist.gov/vuln/detail/CVE-2019-1563 |
17,774 | openssl | 08229ad838c50f644d7e928e2eef147b4308ad64 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64 | Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
An attack is simple, if the first CMS_recipientInfo is valid but the
second CMS_recipientInfo is chosen ciphertext. If the second
recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
encryption key will be replaced by garbage, and the mess... | 0 | static int cms_kari_set1_pkey(CMS_ContentInfo *cms, CMS_RecipientInfo *ri,
EVP_PKEY *pk, X509 *cert)
{
int i;
STACK_OF(CMS_RecipientEncryptedKey) *reks;
CMS_RecipientEncryptedKey *rek;
reks = CMS_RecipientInfo_kari_get0_reks(ri);
for (i = 0; i < sk_CMS_RecipientEncrypte... | 16,136,249,997,634,780,000,000,000,000,000,000,000 | None | null | [
"CWE-311"
] | CVE-2019-1563 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key... | https://nvd.nist.gov/vuln/detail/CVE-2019-1563 |
17,775 | openssl | 08229ad838c50f644d7e928e2eef147b4308ad64 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64 | Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
An attack is simple, if the first CMS_recipientInfo is valid but the
second CMS_recipientInfo is chosen ciphertext. If the second
recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
encryption key will be replaced by garbage, and the mess... | 0 | static int cms_signerinfo_verify_cert(CMS_SignerInfo *si,
X509_STORE *store,
STACK_OF(X509) *certs,
STACK_OF(X509_CRL) *crls)
{
X509_STORE_CTX *ctx = X509_STORE_CTX_new();
X509 *signer;
int i, j... | 153,686,672,721,159,400,000,000,000,000,000,000,000 | None | null | [
"CWE-311"
] | CVE-2019-1563 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key... | https://nvd.nist.gov/vuln/detail/CVE-2019-1563 |
17,776 | openssl | 08229ad838c50f644d7e928e2eef147b4308ad64 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64 | Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
An attack is simple, if the first CMS_recipientInfo is valid but the
second CMS_recipientInfo is chosen ciphertext. If the second
recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
encryption key will be replaced by garbage, and the mess... | 0 | static void do_free_upto(BIO *f, BIO *upto)
{
if (upto) {
BIO *tbio;
do {
tbio = BIO_pop(f);
BIO_free(f);
f = tbio;
}
while (f && f != upto);
} else
BIO_free_all(f);
}
| 152,913,988,329,865,430,000,000,000,000,000,000,000 | None | null | [
"CWE-311"
] | CVE-2019-1563 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key... | https://nvd.nist.gov/vuln/detail/CVE-2019-1563 |
17,777 | openssl | 08229ad838c50f644d7e928e2eef147b4308ad64 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64 | Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
An attack is simple, if the first CMS_recipientInfo is valid but the
second CMS_recipientInfo is chosen ciphertext. If the second
recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
encryption key will be replaced by garbage, and the mess... | 0 | static int PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg)
{
BIO *btmp;
const EVP_MD *md;
if ((btmp = BIO_new(BIO_f_md())) == NULL) {
PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST, ERR_R_BIO_LIB);
goto err;
}
md = EVP_get_digestbyobj(alg->algorithm);
if (md == NULL) {
PKCS7err... | 24,636,659,520,565,320,000,000,000,000,000,000,000 | None | null | [
"CWE-311"
] | CVE-2019-1563 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key... | https://nvd.nist.gov/vuln/detail/CVE-2019-1563 |
17,903 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_compressed2ciphertext (gnutls_session_t session,
opaque * cipher_data, int cipher_size,
gnutls_datum_t compressed,
content_type_t _type, int random_pad)
{
uint8_t MAC[MAX_HASH_SIZE];
uint16_t c_length;
uint8_t pad;
int length, ret;
digest_hd_st td;
uint8_t type = _type;... | 76,103,365,767,470,880,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,904 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_decrypt (gnutls_session_t session, opaque * ciphertext,
size_t ciphertext_size, uint8_t * data,
size_t max_data_size, content_type_t type)
{
gnutls_datum_t gtxt;
gnutls_datum_t gcipher;
int ret;
if (ciphertext_size == 0)
return 0;
gcipher.size = ciphertext_size;
gcipher.data = ciphertext... | 260,299,031,931,155,870,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,905 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_encrypt (gnutls_session_t session, const opaque * headers,
size_t headers_size, const opaque * data,
size_t data_size, opaque * ciphertext,
size_t ciphertext_size, content_type_t type, int random_pad)
{
gnutls_datum_t plain;
gnutls_datum_t comp;
int ret;
int free_comp = 1;
plain.data = (opaq... | 177,292,393,625,055,730,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,906 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | calc_enc_length (gnutls_session_t session, int data_size,
int hash_size, uint8_t * pad, int random_pad,
cipher_type_t block_algo, uint16_t blocksize)
{
uint8_t rnd;
int length, ret;
*pad = 0;
switch (block_algo)
{
case CIPHER_STREAM:
length = data_size + hash_size;
break;
case C... | 320,006,496,717,581,230,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,907 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | is_read_comp_null (gnutls_session_t session)
{
if (session->security_parameters.read_compression_algorithm ==
GNUTLS_COMP_NULL)
return 0;
return 1;
}
| 270,525,160,603,921,680,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,908 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | is_write_comp_null (gnutls_session_t session)
{
if (session->security_parameters.write_compression_algorithm ==
GNUTLS_COMP_NULL)
return 0;
return 1;
}
| 29,664,889,075,036,823,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,909 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | mac_deinit (digest_hd_st *td, opaque * res, int ver)
{
if (ver == GNUTLS_SSL3)
{ /* SSL 3.0 */
_gnutls_mac_deinit_ssl3 (td, res);
}
else
{
_gnutls_hmac_deinit (td, res);
}
}
| 108,240,662,457,004,670,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,910 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | mac_init (digest_hd_st* td, gnutls_mac_algorithm_t mac, opaque * secret, int secret_size,
int ver)
{
int ret = 0;
if (mac == GNUTLS_MAC_NULL)
{
gnutls_assert();
return GNUTLS_E_HASH_FAILED;
}
if (ver == GNUTLS_SSL3)
{ /* SSL 3.0 */
ret = _gnutls_mac_init_ssl3 (td, mac, secret,... | 201,311,306,333,024,580,000,000,000,000,000,000,000 | gnutls_cipher.c | 53,165,855,529,463,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,911 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_finished (gnutls_session_t session, int type, void *ret)
{
const int siz = TLS_MSG_LEN;
opaque concat[36];
size_t len;
const char *mesg;
digest_hd_st td_md5;
digest_hd_st td_sha;
gnutls_protocol_t ver = gnutls_protocol_get_version (session);
int rc;
if (ver < GNUTLS_TLS1_2)
{
rc = _... | 293,794,743,664,403,460,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,912 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_handshake_hash_add_sent (gnutls_session_t session,
gnutls_handshake_description_t type,
opaque * dataptr, uint32_t datalen)
{
int ret;
if ((ret = _gnutls_handshake_hash_pending (session)) < 0)
{
gnutls_assert ();
return ret;
}
if (type != GNUTLS_HANDSHAKE_HELLO_REQUEST)
... | 141,127,071,756,183,850,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,913 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_handshake_hash_buffers_clear (gnutls_session_t session)
{
_gnutls_hash_deinit (&session->internals.handshake_mac_handle_md5, NULL);
_gnutls_hash_deinit (&session->internals.handshake_mac_handle_sha, NULL);
_gnutls_handshake_buffer_clear (session);
}
| 38,936,184,145,998,480,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,914 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_handshake_hash_pending (gnutls_session_t session)
{
size_t siz;
int ret;
opaque *data;
if (session->internals.handshake_mac_handle_init == 0)
{
gnutls_assert ();
return GNUTLS_E_INTERNAL_ERROR;
}
/* We check if there are pending data to hash.
*/
if ((ret = _gnutls_handshake_... | 251,129,115,941,512,200,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,915 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | int _gnutls_negotiate_version( gnutls_session_t session, gnutls_protocol_t adv_version)
{
int ret;
/* if we do not support that version */
if (_gnutls_version_is_supported (session, adv_version) == 0)
{
/* If he requested something we do not support
* then we send him the highest we support.
... | 35,006,182,576,797,160,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,916 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_read_client_hello (gnutls_session_t session, opaque * data,
int datalen)
{
uint8_t session_id_len;
int pos = 0, ret;
uint16_t suite_size, comp_size;
gnutls_protocol_t adv_version;
int neg_version;
int len = datalen;
opaque rnd[TLS_RANDOM_SIZE], *suite_ptr, *comp_ptr;
if (session->internal... | 281,487,474,777,801,620,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,917 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_recv_finished (gnutls_session_t session)
{
uint8_t data[36], *vrfy;
int data_size;
int ret;
int vrfysize;
ret =
_gnutls_recv_handshake (session, &vrfy, &vrfysize,
GNUTLS_HANDSHAKE_FINISHED, MANDATORY_PACKET);
if (ret < 0)
{
ERR ("recv finished int", ret);
gnutls_assert ()... | 21,200,338,649,407,780,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,918 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_send_empty_handshake (gnutls_session_t session,
gnutls_handshake_description_t type, int again)
{
opaque data = 0;
opaque *ptr;
if (again == 0)
ptr = &data;
else
ptr = NULL;
return _gnutls_send_handshake (session, ptr, 0, type);
}
| 118,412,732,443,409,110,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,919 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_send_finished (gnutls_session_t session, int again)
{
uint8_t data[36];
int ret;
int data_size = 0;
if (again == 0)
{
/* This is needed in order to hash all the required
* messages.
*/
if ((ret = _gnutls_handshake_hash_pending (session)) < 0)
{
gnutls_assert ();
r... | 63,914,130,486,440,900,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,920 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_send_handshake (gnutls_session_t session, void *i_data,
uint32_t i_datasize,
gnutls_handshake_description_t type)
{
int ret;
uint8_t *data;
uint32_t datasize;
int pos = 0;
if (i_data == NULL && i_datasize == 0)
{
/* we are resuming a previously interrupted
* send.
*/
... | 54,888,698,167,969,370,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,921 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_server_find_pk_algos_in_ciphersuites (const opaque *
data, int datalen)
{
int j;
gnutls_pk_algorithm_t algo = GNUTLS_PK_NONE, prev_algo = 0;
gnutls_kx_algorithm_t kx;
cipher_suite_st cs;
if (datalen % 2 != 0)
{
gnutls_assert ();
return GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
... | 128,659,461,644,250,890,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,922 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_server_select_comp_method (gnutls_session_t session,
opaque * data, int datalen)
{
int x, i, j;
uint8_t *comps;
x = _gnutls_supported_compression_methods (session, &comps);
if (x < 0)
{
gnutls_assert ();
return x;
}
memset (&session->internals.compression_method, 0,
siz... | 11,501,034,097,969,095,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,923 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_set_server_random (gnutls_session_t session, uint8_t * rnd)
{
memcpy (session->security_parameters.server_random, rnd, TLS_RANDOM_SIZE);
}
| 218,591,216,534,427,540,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,924 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_ssl3_finished (gnutls_session_t session, int type, opaque * ret)
{
const int siz = SSL_MSG_LEN;
digest_hd_st td_md5;
digest_hd_st td_sha;
const char *mesg;
int rc;
rc = _gnutls_hash_copy (&td_md5, &session->internals.handshake_mac_handle_md5);
if (rc < 0)
{
gnutls_assert ();
retur... | 65,511,753,567,232,200,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,925 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | _gnutls_tls_create_random (opaque * dst)
{
uint32_t tim;
int ret;
/* Use weak random numbers for the most of the
* buffer except for the first 4 that are the
* system's time.
*/
tim = time (NULL);
/* generate server random value */
_gnutls_write_uint32 (tim, dst);
ret = _gnutls_rnd (RND_NONCE,... | 36,349,735,020,444,202,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,926 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | int _gnutls_user_hello_func( gnutls_session session, gnutls_protocol_t adv_version)
{
int ret;
if (session->internals.user_hello_func != NULL)
{
ret = session->internals.user_hello_func( session);
if (ret < 0)
{
gnutls_assert();
return ret;
}
/* Here we nee... | 174,474,645,022,079,240,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,927 | savannah | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | None | 0 | resume_copy_required_values (gnutls_session_t session)
{
/* get the new random values */
memcpy (session->internals.resumed_security_parameters.
server_random,
session->security_parameters.server_random, TLS_RANDOM_SIZE);
memcpy (session->internals.resumed_security_parameters.
client_random,
session->... | 330,257,690,946,717,530,000,000,000,000,000,000,000 | gnutls_handshake.c | 102,421,791,983,933,270,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1950 | Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit... | https://nvd.nist.gov/vuln/detail/CVE-2008-1950 |
17,928 | libav | 58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | vqavideo: return error if image size is not a multiple of block size
The decoder assumes in various places that the image size
is a multiple of the block size, and there is no obvious
way to support odd sizes. Bailing out early if the header
specifies a bad size avoids various errors later on.
Fixes CVE-2012-0947.
... | 0 | static int decode_format80(GetByteContext *gb, int src_size,
unsigned char *dest, int dest_size, int check_size) {
int dest_index = 0;
int count, opcode, start;
int src_pos;
unsigned char color;
int i;
start = bytestream2_tell(gb);
while (bytestream2_tell(gb) - start < src_size) {
... | 203,793,178,962,512,260,000,000,000,000,000,000,000 | vqavideo.c | 170,156,246,542,730,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0947 | Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil... | https://nvd.nist.gov/vuln/detail/CVE-2012-0947 |
17,929 | libav | 58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | vqavideo: return error if image size is not a multiple of block size
The decoder assumes in various places that the image size
is a multiple of the block size, and there is no obvious
way to support odd sizes. Bailing out early if the header
specifies a bad size avoids various errors later on.
Fixes CVE-2012-0947.
... | 0 | static int vqa_decode_chunk(VqaContext *s)
{
unsigned int chunk_type;
unsigned int chunk_size;
int byte_skip;
unsigned int index = 0;
int i;
unsigned char r, g, b;
int index_shift;
int res;
int cbf0_chunk = -1;
int cbfz_chunk = -1;
int cbp0_chunk = -1;
int cbpz_chunk = -... | 212,217,309,902,338,230,000,000,000,000,000,000,000 | vqavideo.c | 170,156,246,542,730,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0947 | Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil... | https://nvd.nist.gov/vuln/detail/CVE-2012-0947 |
17,930 | libav | 58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | vqavideo: return error if image size is not a multiple of block size
The decoder assumes in various places that the image size
is a multiple of the block size, and there is no obvious
way to support odd sizes. Bailing out early if the header
specifies a bad size avoids various errors later on.
Fixes CVE-2012-0947.
... | 0 | static int vqa_decode_frame(AVCodecContext *avctx,
void *data, int *data_size,
AVPacket *avpkt)
{
VqaContext *s = avctx->priv_data;
int res;
if (s->frame.data[0])
avctx->release_buffer(avctx, &s->frame);
if (avctx->get_buffer(avctx, &s->f... | 220,567,395,071,001,550,000,000,000,000,000,000,000 | vqavideo.c | 170,156,246,542,730,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0947 | Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil... | https://nvd.nist.gov/vuln/detail/CVE-2012-0947 |
17,931 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void pop_end(stroke_msg_t *msg, const char* label, stroke_end_t *end)
{
pop_string(msg, &end->address);
pop_string(msg, &end->subnets);
pop_string(msg, &end->sourceip);
pop_string(msg, &end->dns);
pop_string(msg, &end->auth);
pop_string(msg, &end->auth2);
pop_string(msg, &end->id);
pop_string(msg, &end->... | 210,746,954,125,106,750,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,932 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void pop_string(stroke_msg_t *msg, char **string)
{
if (*string == NULL)
{
return;
}
/* check for sanity of string pointer and string */
if (string < (char**)msg ||
string > (char**)((char*)msg + sizeof(stroke_msg_t)) ||
(unsigned long)*string < (unsigned long)((char*)msg->buffer - (char*)msg) ||
(... | 219,963,372,204,856,000,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,933 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void print_pem_cert(FILE *out, certificate_t *cert)
{
chunk_t encoded;
if (cert->get_encoding(cert, CERT_PEM, &encoded))
{
fprintf(out, "%.*s", (int)encoded.len, encoded.ptr);
free(encoded.ptr);
}
}
| 266,002,345,534,518,970,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,934 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_add_ca(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->add_ca.name);
DBG1(DBG_CFG, "received stroke: add ca '%s'", msg->add_ca.name);
pop_string(msg, &msg->add_ca.cacert);
pop_string(msg, &msg->add_ca.crluri);
pop_string(msg, &msg->add_ca.crluri2);
... | 288,033,283,969,537,570,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,935 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_add_conn(private_stroke_socket_t *this, stroke_msg_t *msg)
{
pop_string(msg, &msg->add_conn.name);
DBG1(DBG_CFG, "received stroke: add connection '%s'", msg->add_conn.name);
DBG2(DBG_CFG, "conn %s", msg->add_conn.name);
pop_end(msg, "left", &msg->add_conn.me);
pop_end(msg, "right", &msg->add_co... | 117,215,218,851,392,180,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,936 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_config(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
this->cred->cachecrl(this->cred, msg->config.cachecrl);
}
| 314,211,353,853,571,600,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,937 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_counters(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->counters.name);
if (msg->counters.reset)
{
this->counter->reset(this->counter, msg->counters.name);
}
else
{
this->counter->print(this->counter, out, msg->counters.name);
}
}
| 233,798,247,257,565,350,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,938 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_del_ca(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->del_ca.name);
DBG1(DBG_CFG, "received stroke: delete ca '%s'", msg->del_ca.name);
this->ca->del(this->ca, msg);
}
| 329,693,688,249,452,580,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,939 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_del_conn(private_stroke_socket_t *this, stroke_msg_t *msg)
{
pop_string(msg, &msg->del_conn.name);
DBG1(DBG_CFG, "received stroke: delete connection '%s'", msg->del_conn.name);
this->config->del(this->config, msg);
this->attribute->del_dns(this->attribute, msg);
this->handler->del_attributes(th... | 316,732,387,365,407,170,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,940 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_export(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->export.selector);
if (msg->export.flags & EXPORT_X509)
{
enumerator_t *enumerator;
identification_t *id;
certificate_t *cert;
id = identification_create_from_string(msg->export.selector);
... | 167,923,078,491,625,440,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,941 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_initiate(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->initiate.name);
DBG1(DBG_CFG, "received stroke: initiate '%s'", msg->initiate.name);
this->control->initiate(this->control, msg, out);
}
| 318,266,597,433,593,100,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,942 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_leases(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->leases.pool);
pop_string(msg, &msg->leases.address);
this->list->leases(this->list, msg, out);
}
| 679,925,628,512,522,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,943 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_list(private_stroke_socket_t *this, stroke_msg_t *msg,
FILE *out)
{
if (msg->list.flags & LIST_CAINFOS)
{
this->ca->list(this->ca, msg, out);
}
this->list->list(this->list, msg, out);
}
| 223,671,912,975,313,080,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,944 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_loglevel(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
debug_t group;
pop_string(msg, &(msg->loglevel.type));
DBG1(DBG_CFG, "received stroke: loglevel %d for %s",
msg->loglevel.level, msg->loglevel.type);
if (this->prevent_loglevel_changes)
{
DBG1(DBG_CFG, "prevent... | 334,673,341,599,501,060,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,945 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_purge(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
if (msg->purge.flags & PURGE_OCSP)
{
lib->credmgr->flush_cache(lib->credmgr, CERT_X509_OCSP_RESPONSE);
}
if (msg->purge.flags & PURGE_CRLS)
{
lib->credmgr->flush_cache(lib->credmgr, CERT_X509_CRL);
}
if (msg->purge... | 330,796,393,056,310,540,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,946 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_reread(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
this->cred->reread(this->cred, msg, out);
}
| 59,564,100,363,330,970,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,947 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_route(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->route.name);
DBG1(DBG_CFG, "received stroke: route '%s'", msg->route.name);
this->control->route(this->control, msg, out);
}
| 55,153,610,981,195,640,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,948 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_status(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out, bool all, bool wait)
{
pop_string(msg, &(msg->status.name));
this->list->status(this->list, msg, out, all, wait);
}
| 188,755,309,457,937,640,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,949 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_terminate(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->terminate.name);
DBG1(DBG_CFG, "received stroke: terminate '%s'", msg->terminate.name);
this->control->terminate(this->control, msg, out);
}
| 184,043,304,630,809,200,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,950 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_terminate_srcip(private_stroke_socket_t *this,
stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->terminate_srcip.start);
pop_string(msg, &msg->terminate_srcip.end);
DBG1(DBG_CFG, "received stroke: terminate-srcip %s-%s",
msg->terminate_srcip.start, msg->terminate_srcip.end);
th... | 57,182,975,899,190,050,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,951 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void stroke_unroute(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out)
{
pop_string(msg, &msg->terminate.name);
DBG1(DBG_CFG, "received stroke: unroute '%s'", msg->route.name);
this->control->unroute(this->control, msg, out);
}
| 234,512,961,636,216,550,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,952 | strongswan | 0acd1ab4d08d53d80393b1a37b8781f6e7b2b996 | https://git.strongswan.org/?p=strongswan | https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4 | None | 0 | static void sum_usage(FILE *out, int count, size_t bytes, int whitelisted)
{
fprintf(out, "Total memory usage: %zu\n", bytes);
}
| 2,447,606,670,002,469,600,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5388 | In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-5388 |
17,953 | openssl | 392fa7a952e97d82eac6958c81ed1e256e6b8ca5 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=392fa7a952e97d82eac6958c81ed1e256e6b8ca5 | Keep old method in case of an unsupported protocol
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d07187b59551e4fad3db4e52ea73f2c. Keep the old
method since the code is ... | 0 | int ssl23_accept(SSL *s)
{
BUF_MEM *buf;
unsigned long Time=(unsigned long)time(NULL);
void (*cb)(const SSL *ssl,int type,int val)=NULL;
int ret= -1;
int new_state,state;
RAND_add(&Time,sizeof(Time),0);
ERR_clear_error();
clear_sys_error();
if (s->info_callback != NULL)
cb=s->info_callback;
else if (s->c... | 35,399,316,197,627,810,000,000,000,000,000,000,000 | None | null | [] | CVE-2014-3569 | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handsha... | https://nvd.nist.gov/vuln/detail/CVE-2014-3569 |
17,954 | openssl | 392fa7a952e97d82eac6958c81ed1e256e6b8ca5 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=392fa7a952e97d82eac6958c81ed1e256e6b8ca5 | Keep old method in case of an unsupported protocol
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d07187b59551e4fad3db4e52ea73f2c. Keep the old
method since the code is ... | 0 | static const SSL_METHOD *ssl23_get_server_method(int ver)
{
#ifndef OPENSSL_NO_SSL2
if (ver == SSL2_VERSION)
return(SSLv2_server_method());
#endif
#ifndef OPENSSL_NO_SSL3
if (ver == SSL3_VERSION)
return(SSLv3_server_method());
#endif
if (ver == TLS1_VERSION)
return(TLSv1_server_method());
else if (ver == TLS... | 223,618,537,911,782,600,000,000,000,000,000,000,000 | None | null | [] | CVE-2014-3569 | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handsha... | https://nvd.nist.gov/vuln/detail/CVE-2014-3569 |
17,955 | openssl | b82924741b4bd590da890619be671f4635e46c2b | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=b82924741b4bd590da890619be671f4635e46c2b | Keep old method in case of an unsupported protocol
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d07187b59551e4fad3db4e52ea73f2c. Keep the old
method since the code is ... | 0 | static SSL_METHOD *ssl23_get_server_method(int ver)
{
#ifndef OPENSSL_NO_SSL2
if (ver == SSL2_VERSION)
return(SSLv2_server_method());
#endif
#ifndef OPENSSL_NO_SSL3
if (ver == SSL3_VERSION)
return(SSLv3_server_method());
#endif
if (ver == TLS1_VERSION)
return(TLSv1_server_method());
else
return(NULL);
}
| 159,765,829,539,381,680,000,000,000,000,000,000,000 | None | null | [] | CVE-2014-3569 | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handsha... | https://nvd.nist.gov/vuln/detail/CVE-2014-3569 |
17,959 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit)
{
int extdatalen=0;
unsigned char *orig = buf;
unsigned char *ret = buf;
/* don't add extensions for SSLv3 unless doing secure renegotiation */
if (s->client_version == SSL3_VERSION
&& !s->s3->send_connection_binding... | 206,524,910,392,518,450,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,960 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | unsigned char *ssl_add_serverhello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit)
{
int extdatalen=0;
unsigned char *orig = buf;
unsigned char *ret = buf;
#ifndef OPENSSL_NO_NEXTPROTONEG
int next_proto_neg_seen;
#endif
/* don't add extensions for SSLv3, unless doing secure renegotiation */
if (s->vers... | 76,602,906,540,445,020,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,961 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int ssl_check_clienthello_tlsext_early(SSL *s)
{
int ret=SSL_TLSEXT_ERR_NOACK;
int al = SSL_AD_UNRECOGNIZED_NAME;
#ifndef OPENSSL_NO_EC
/* The handling of the ECPointFormats extension is done elsewhere, namely in
* ssl3_choose_cipher in s3_lib.c.
*/
/* The handling of the EllipticCurves extension is done els... | 225,909,370,080,466,800,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,962 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int ssl_check_serverhello_tlsext(SSL *s)
{
int ret=SSL_TLSEXT_ERR_NOACK;
int al = SSL_AD_UNRECOGNIZED_NAME;
#ifndef OPENSSL_NO_EC
/* If we are client and using an elliptic curve cryptography cipher
* suite, then if server returns an EC point formats lists extension
* it must contain uncompressed.
*/
unsigne... | 21,651,754,238,731,280,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,963 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
{
unsigned short type;
unsigned short size;
unsigned short len;
unsigned char *data = *p;
int renegotiate_seen = 0;
int sigalg_seen = 0;
s->servername_done = 0;
s->tlsext_status_type = -1;
#ifndef OPENSSL_NO_NEXTPROT... | 3,221,828,317,652,265,400,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,964 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int ssl_parse_serverhello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
{
unsigned short length;
unsigned short type;
unsigned short size;
unsigned char *data = *p;
int tlsext_servername = 0;
int renegotiate_seen = 0;
#ifndef OPENSSL_NO_NEXTPROTONEG
s->s3->next_proto_neg_seen = 0;
#endif
... | 229,867,559,169,355,040,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,965 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int ssl_prepare_clienthello_tlsext(SSL *s)
{
#ifndef OPENSSL_NO_EC
/* If we are client and using an elliptic curve cryptography cipher suite, send the point formats
* and elliptic curves we support.
*/
int using_ecc = 0;
int i;
unsigned char *j;
unsigned long alg_k, alg_a;
STACK_OF(SSL_CIPHER) *cipher_stack... | 45,937,991,802,660,030,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,966 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int ssl_prepare_serverhello_tlsext(SSL *s)
{
#ifndef OPENSSL_NO_EC
/* If we are server and using an ECC cipher suite, send the point formats we support
* if the client sent us an ECPointsFormat extension. Note that the server is not
* supposed to send an EllipticCurves extension.
*/
unsigned long alg_k = s-... | 103,520,033,582,861,430,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,967 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int tls1_ec_curve_id2nid(int curve_id)
{
/* ECC curves from draft-ietf-tls-ecc-12.txt (Oct. 17, 2005) */
if ((curve_id < 1) || ((unsigned int)curve_id >
sizeof(nid_list)/sizeof(nid_list[0])))
return 0;
return nid_list[curve_id-1];
}
| 166,261,407,781,454,040,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,968 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int tls1_ec_nid2curve_id(int nid)
{
/* ECC curves from draft-ietf-tls-ecc-12.txt (Oct. 17, 2005) */
switch (nid)
{
case NID_sect163k1: /* sect163k1 (1) */
return 1;
case NID_sect163r1: /* sect163r1 (2) */
return 2;
case NID_sect163r2: /* sect163r2 (3) */
return 3;
case NID_sect193r1: /* sect193r1 (4) */ ... | 276,618,760,653,842,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,969 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int tls1_process_sigalgs(SSL *s, const unsigned char *data, int dsize)
{
int i, idx;
const EVP_MD *md;
CERT *c = s->cert;
/* Extension ignored for TLS versions below 1.2 */
if (TLS1_get_version(s) < TLS1_2_VERSION)
return 1;
/* Should never happen */
if (!c)
return 0;
c->pkeys[SSL_PKEY_DSA_SIGN].digest = ... | 267,372,548,287,716,850,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,970 | openssl | 7fd4ce6a997be5f5c9e744ac527725c2850de203 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) | 0 | int tls1_process_ticket(SSL *s, unsigned char *session_id, int len,
const unsigned char *limit, SSL_SESSION **ret)
{
/* Point after session ID in client hello */
const unsigned char *p = session_id + len;
unsigned short i;
*ret = NULL;
s->tlsext_ticket_expected = 0;
/* If tickets disabled behave as if no ti... | 81,278,578,361,818,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
17,971 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | add_io_cb (engine_gpgsm_t gpgsm, iocb_data_t *iocbd, gpgme_io_cb_t handler)
{
gpgme_error_t err;
TRACE_BEG2 (DEBUG_ENGINE, "engine-gpgsm:add_io_cb", gpgsm,
"fd %d, dir %d", iocbd->fd, iocbd->dir);
err = (*gpgsm->io_cbs.add) (gpgsm->io_cbs.add_priv,
iocbd->fd, iocbd->dir,
handler, ... | 331,661,830,818,791,130,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,972 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | default_inq_cb (engine_gpgsm_t gpgsm, const char *line)
{
if (!strncmp (line, "PINENTRY_LAUNCHED", 17) && (line[17]==' '||!line[17]))
{
_gpgme_allow_set_foreground_window ((pid_t)strtoul (line+17, NULL, 10));
}
return 0;
}
| 252,232,124,654,990,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,973 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_assuan_simple_command (assuan_context_t ctx, char *cmd,
engine_status_handler_t status_fnc,
void *status_fnc_value)
{
gpg_error_t err;
char *line;
size_t linelen;
err = assuan_write_line (ctx, cmd);
if (err)
return err;
do
{
err = assuan_read_line (ctx, &line, &linelen)... | 130,775,451,994,638,840,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,974 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_cancel (void *engine)
{
engine_gpgsm_t gpgsm = engine;
if (!gpgsm)
return gpg_error (GPG_ERR_INV_VALUE);
if (gpgsm->status_cb.fd != -1)
_gpgme_io_close (gpgsm->status_cb.fd);
if (gpgsm->input_cb.fd != -1)
_gpgme_io_close (gpgsm->input_cb.fd);
if (gpgsm->output_cb.fd != -1)
_gpgme_io_cl... | 142,762,845,927,308,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,975 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_clear_fd (engine_gpgsm_t gpgsm, fd_type_t fd_type)
{
#if !USE_DESCRIPTOR_PASSING
switch (fd_type)
{
case INPUT_FD:
_gpgme_io_close (gpgsm->input_cb.fd);
break;
case OUTPUT_FD:
_gpgme_io_close (gpgsm->output_cb.fd);
break;
case MESSAGE_FD:
_gpgme_io_close (gpgsm->mes... | 253,924,727,189,050,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,976 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_decrypt (void *engine, gpgme_data_t ciph, gpgme_data_t plain)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
if (!gpgsm)
return gpg_error (GPG_ERR_INV_VALUE);
gpgsm->input_cb.data = ciph;
err = gpgsm_set_fd (gpgsm, INPUT_FD, map_data_enc (gpgsm->input_cb.data));
if (err)
return gpg_erro... | 287,112,041,077,714,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,977 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_delete (void *engine, gpgme_key_t key, int allow_secret)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
char *fpr = key->subkeys ? key->subkeys->fpr : NULL;
char *linep = fpr;
char *line;
int length = 8; /* "DELKEYS " */
if (!fpr)
return gpg_error (GPG_ERR_INV_VALUE);
while (*linep)
... | 118,600,996,471,402,810,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,978 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_encrypt (void *engine, gpgme_key_t recp[], gpgme_encrypt_flags_t flags,
gpgme_data_t plain, gpgme_data_t ciph, int use_armor)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
if (!gpgsm)
return gpg_error (GPG_ERR_INV_VALUE);
if (!recp)
return gpg_error (GPG_ERR_NOT_IMPLEMENTED);
if ... | 148,167,530,578,311,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,979 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_export (void *engine, const char *pattern, gpgme_export_mode_t mode,
gpgme_data_t keydata, int use_armor)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err = 0;
char *cmd;
if (!gpgsm)
return gpg_error (GPG_ERR_INV_VALUE);
if (mode)
return gpg_error (GPG_ERR_NOT_SUPPORTED);
if (!patt... | 287,779,340,679,816,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,980 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_export_ext (void *engine, const char *pattern[], gpgme_export_mode_t mode,
gpgme_data_t keydata, int use_armor)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err = 0;
char *line;
/* Length is "EXPORT " + p + '\0'. */
int length = 7 + 1;
char *linep;
if (!gpgsm)
return gpg_error (GPG_ERR_I... | 210,580,287,797,479,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,981 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_genkey (void *engine, gpgme_data_t help_data, int use_armor,
gpgme_data_t pubkey, gpgme_data_t seckey)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
if (!gpgsm || !pubkey || seckey)
return gpg_error (GPG_ERR_INV_VALUE);
gpgsm->input_cb.data = help_data;
err = gpgsm_set_fd (gpgsm, INPU... | 121,987,477,556,155,250,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,982 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_get_req_version (void)
{
return "2.0.4";
}
| 306,259,557,145,575,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,983 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_get_version (const char *file_name)
{
return _gpgme_get_program_version (file_name ? file_name
: _gpgme_get_default_gpgsm_name ());
}
| 243,396,165,840,940,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,984 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_getauditlog (void *engine, gpgme_data_t output, unsigned int flags)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err = 0;
if (!gpgsm || !output)
return gpg_error (GPG_ERR_INV_VALUE);
#if USE_DESCRIPTOR_PASSING
gpgsm->output_cb.data = output;
err = gpgsm_set_fd (gpgsm, OUTPUT_FD, 0);
if (err)
... | 241,655,934,246,929,870,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,985 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_import (void *engine, gpgme_data_t keydata, gpgme_key_t *keyarray)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
gpgme_data_encoding_t dataenc;
int idx;
if (!gpgsm)
return gpg_error (GPG_ERR_INV_VALUE);
if (keydata && keyarray)
return gpg_error (GPG_ERR_INV_VALUE); /* Only one is allow... | 212,263,734,964,397,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,986 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_io_event (void *engine, gpgme_event_io_t type, void *type_data)
{
engine_gpgsm_t gpgsm = engine;
TRACE3 (DEBUG_ENGINE, "gpgme:gpgsm_io_event", gpgsm,
"event %p, type %d, type_data %p",
gpgsm->io_cbs.event, type, type_data);
if (gpgsm->io_cbs.event)
(*gpgsm->io_cbs.event) (gpgsm->io_... | 151,143,986,515,847,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,987 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_keylist (void *engine, const char *pattern, int secret_only,
gpgme_keylist_mode_t mode)
{
engine_gpgsm_t gpgsm = engine;
char *line;
gpgme_error_t err;
int list_mode = 0;
if (mode & GPGME_KEYLIST_MODE_LOCAL)
list_mode |= 1;
if (mode & GPGME_KEYLIST_MODE_EXTERN)
list_mode |= 2;
if (... | 121,175,099,573,277,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,988 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_new (void **engine, const char *file_name, const char *home_dir)
{
gpgme_error_t err = 0;
engine_gpgsm_t gpgsm;
const char *pgmname;
const char *argv[5];
int argc;
#if !USE_DESCRIPTOR_PASSING
int fds[2];
int child_fds[4];
#endif
char *dft_display = NULL;
char dft_ttyname[64];
char *dft_ttytype... | 162,273,337,165,806,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,989 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_passwd (void *engine, gpgme_key_t key, unsigned int flags)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
char *line;
if (!key || !key->subkeys || !key->subkeys->fpr)
return gpg_error (GPG_ERR_INV_CERT_OBJ);
if (asprintf (&line, "PASSWD -- %s", key->subkeys->fpr) < 0)
return gpg_error_fro... | 58,515,961,705,034,090,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,990 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_release (void *engine)
{
engine_gpgsm_t gpgsm = engine;
if (!gpgsm)
return;
gpgsm_cancel (engine);
free (gpgsm->colon.attic.line);
free (gpgsm);
}
| 42,721,730,485,193,720,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,991 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_reset (void *engine)
{
engine_gpgsm_t gpgsm = engine;
/* IF we have an active connection we must send a reset because we
need to reset the list of signers. Note that RESET does not
reset OPTION commands. */
return (gpgsm->assuan_ctx
? gpgsm_assuan_simple_command (gpgsm->assuan_ctx, "RE... | 187,864,492,754,090,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,992 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_set_colon_line_handler (void *engine, engine_colon_line_handler_t fnc,
void *fnc_value)
{
engine_gpgsm_t gpgsm = engine;
gpgsm->colon.fnc = fnc;
gpgsm->colon.fnc_value = fnc_value;
gpgsm->colon.any = 0;
return 0;
}
| 319,998,747,032,196,170,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,993 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_set_io_cbs (void *engine, gpgme_io_cbs_t io_cbs)
{
engine_gpgsm_t gpgsm = engine;
gpgsm->io_cbs = *io_cbs;
}
| 183,326,919,622,753,420,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,994 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_set_locale (void *engine, int category, const char *value)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
char *optstr;
char *catstr;
/* FIXME: If value is NULL, we need to reset the option to default.
But we can't do this. So we error out here. GPGSM needs support
for this. */
if (... | 304,227,267,755,027,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,995 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_sign (void *engine, gpgme_data_t in, gpgme_data_t out,
gpgme_sig_mode_t mode, int use_armor, int use_textmode,
int include_certs, gpgme_ctx_t ctx /* FIXME */)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
char *assuan_cmd;
int i;
gpgme_key_t key;
if (!gpgsm)
return gpg_error (GPG_... | 143,084,456,875,846,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,996 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | gpgsm_verify (void *engine, gpgme_data_t sig, gpgme_data_t signed_text,
gpgme_data_t plaintext)
{
engine_gpgsm_t gpgsm = engine;
gpgme_error_t err;
if (!gpgsm)
return gpg_error (GPG_ERR_INV_VALUE);
gpgsm->input_cb.data = sig;
err = gpgsm_set_fd (gpgsm, INPUT_FD, map_data_enc (gpgsm->input_cb.data... | 330,769,172,623,098,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,997 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | map_data_enc (gpgme_data_t d)
{
switch (gpgme_data_get_encoding (d))
{
case GPGME_DATA_ENCODING_NONE:
break;
case GPGME_DATA_ENCODING_BINARY:
return "--binary";
case GPGME_DATA_ENCODING_BASE64:
return "--base64";
case GPGME_DATA_ENCODING_ARMOR:
return "--armor";
default... | 288,296,748,968,206,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,998 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | set_recipients (engine_gpgsm_t gpgsm, gpgme_key_t recp[])
{
gpgme_error_t err = 0;
assuan_context_t ctx = gpgsm->assuan_ctx;
char *line;
int linelen;
int invalid_recipients = 0;
int i;
linelen = 10 + 40 + 1; /* "RECIPIENT " + guess + '\0'. */
line = malloc (10 + 40 + 1);
if (!line)
return gpg_er... | 153,758,833,527,488,360,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
17,999 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | _uiserver_decrypt (void *engine, int verify,
gpgme_data_t ciph, gpgme_data_t plain)
{
engine_uiserver_t uiserver = engine;
gpgme_error_t err;
const char *protocol;
char *cmd;
if (!uiserver)
return gpg_error (GPG_ERR_INV_VALUE);
if (uiserver->protocol == GPGME_PROTOCOL_DEFAULT)
protocol = "";
... | 288,341,916,667,129,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
18,000 | gnupg | 2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 | None | 0 | add_io_cb (engine_uiserver_t uiserver, iocb_data_t *iocbd, gpgme_io_cb_t handler)
{
gpgme_error_t err;
TRACE_BEG2 (DEBUG_ENGINE, "engine-uiserver:add_io_cb", uiserver,
"fd %d, dir %d", iocbd->fd, iocbd->dir);
err = (*uiserver->io_cbs.add) (uiserver->io_cbs.add_priv,
iocbd->fd, iocbd->dir,
... | 60,607,498,703,830,330,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3564 | Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." | https://nvd.nist.gov/vuln/detail/CVE-2014-3564 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.