idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
17,773
openssl
08229ad838c50f644d7e928e2eef147b4308ad64
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey An attack is simple, if the first CMS_recipientInfo is valid but the second CMS_recipientInfo is chosen ciphertext. If the second recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct encryption key will be replaced by garbage, and the mess...
0
static BIO *cms_get_text_bio(BIO *out, unsigned int flags) { BIO *rbio; if (out == NULL) rbio = BIO_new(BIO_s_null()); else if (flags & CMS_TEXT) { rbio = BIO_new(BIO_s_mem()); BIO_set_mem_eof_return(rbio, 0); } else rbio = out; return rbio; }
108,305,789,512,885,530,000,000,000,000,000,000,000
None
null
[ "CWE-311" ]
CVE-2019-1563
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key...
https://nvd.nist.gov/vuln/detail/CVE-2019-1563
17,774
openssl
08229ad838c50f644d7e928e2eef147b4308ad64
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey An attack is simple, if the first CMS_recipientInfo is valid but the second CMS_recipientInfo is chosen ciphertext. If the second recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct encryption key will be replaced by garbage, and the mess...
0
static int cms_kari_set1_pkey(CMS_ContentInfo *cms, CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *cert) { int i; STACK_OF(CMS_RecipientEncryptedKey) *reks; CMS_RecipientEncryptedKey *rek; reks = CMS_RecipientInfo_kari_get0_reks(ri); for (i = 0; i < sk_CMS_RecipientEncrypte...
16,136,249,997,634,780,000,000,000,000,000,000,000
None
null
[ "CWE-311" ]
CVE-2019-1563
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key...
https://nvd.nist.gov/vuln/detail/CVE-2019-1563
17,775
openssl
08229ad838c50f644d7e928e2eef147b4308ad64
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey An attack is simple, if the first CMS_recipientInfo is valid but the second CMS_recipientInfo is chosen ciphertext. If the second recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct encryption key will be replaced by garbage, and the mess...
0
static int cms_signerinfo_verify_cert(CMS_SignerInfo *si, X509_STORE *store, STACK_OF(X509) *certs, STACK_OF(X509_CRL) *crls) { X509_STORE_CTX *ctx = X509_STORE_CTX_new(); X509 *signer; int i, j...
153,686,672,721,159,400,000,000,000,000,000,000,000
None
null
[ "CWE-311" ]
CVE-2019-1563
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key...
https://nvd.nist.gov/vuln/detail/CVE-2019-1563
17,776
openssl
08229ad838c50f644d7e928e2eef147b4308ad64
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey An attack is simple, if the first CMS_recipientInfo is valid but the second CMS_recipientInfo is chosen ciphertext. If the second recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct encryption key will be replaced by garbage, and the mess...
0
static void do_free_upto(BIO *f, BIO *upto) { if (upto) { BIO *tbio; do { tbio = BIO_pop(f); BIO_free(f); f = tbio; } while (f && f != upto); } else BIO_free_all(f); }
152,913,988,329,865,430,000,000,000,000,000,000,000
None
null
[ "CWE-311" ]
CVE-2019-1563
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key...
https://nvd.nist.gov/vuln/detail/CVE-2019-1563
17,777
openssl
08229ad838c50f644d7e928e2eef147b4308ad64
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey An attack is simple, if the first CMS_recipientInfo is valid but the second CMS_recipientInfo is chosen ciphertext. If the second recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct encryption key will be replaced by garbage, and the mess...
0
static int PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg) { BIO *btmp; const EVP_MD *md; if ((btmp = BIO_new(BIO_f_md())) == NULL) { PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST, ERR_R_BIO_LIB); goto err; } md = EVP_get_digestbyobj(alg->algorithm); if (md == NULL) { PKCS7err...
24,636,659,520,565,320,000,000,000,000,000,000,000
None
null
[ "CWE-311" ]
CVE-2019-1563
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key...
https://nvd.nist.gov/vuln/detail/CVE-2019-1563
17,903
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_compressed2ciphertext (gnutls_session_t session, opaque * cipher_data, int cipher_size, gnutls_datum_t compressed, content_type_t _type, int random_pad) { uint8_t MAC[MAX_HASH_SIZE]; uint16_t c_length; uint8_t pad; int length, ret; digest_hd_st td; uint8_t type = _type;...
76,103,365,767,470,880,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,904
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_decrypt (gnutls_session_t session, opaque * ciphertext, size_t ciphertext_size, uint8_t * data, size_t max_data_size, content_type_t type) { gnutls_datum_t gtxt; gnutls_datum_t gcipher; int ret; if (ciphertext_size == 0) return 0; gcipher.size = ciphertext_size; gcipher.data = ciphertext...
260,299,031,931,155,870,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,905
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_encrypt (gnutls_session_t session, const opaque * headers, size_t headers_size, const opaque * data, size_t data_size, opaque * ciphertext, size_t ciphertext_size, content_type_t type, int random_pad) { gnutls_datum_t plain; gnutls_datum_t comp; int ret; int free_comp = 1; plain.data = (opaq...
177,292,393,625,055,730,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,906
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
calc_enc_length (gnutls_session_t session, int data_size, int hash_size, uint8_t * pad, int random_pad, cipher_type_t block_algo, uint16_t blocksize) { uint8_t rnd; int length, ret; *pad = 0; switch (block_algo) { case CIPHER_STREAM: length = data_size + hash_size; break; case C...
320,006,496,717,581,230,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,907
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
is_read_comp_null (gnutls_session_t session) { if (session->security_parameters.read_compression_algorithm == GNUTLS_COMP_NULL) return 0; return 1; }
270,525,160,603,921,680,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,908
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
is_write_comp_null (gnutls_session_t session) { if (session->security_parameters.write_compression_algorithm == GNUTLS_COMP_NULL) return 0; return 1; }
29,664,889,075,036,823,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,909
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
mac_deinit (digest_hd_st *td, opaque * res, int ver) { if (ver == GNUTLS_SSL3) { /* SSL 3.0 */ _gnutls_mac_deinit_ssl3 (td, res); } else { _gnutls_hmac_deinit (td, res); } }
108,240,662,457,004,670,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,910
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
mac_init (digest_hd_st* td, gnutls_mac_algorithm_t mac, opaque * secret, int secret_size, int ver) { int ret = 0; if (mac == GNUTLS_MAC_NULL) { gnutls_assert(); return GNUTLS_E_HASH_FAILED; } if (ver == GNUTLS_SSL3) { /* SSL 3.0 */ ret = _gnutls_mac_init_ssl3 (td, mac, secret,...
201,311,306,333,024,580,000,000,000,000,000,000,000
gnutls_cipher.c
53,165,855,529,463,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,911
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_finished (gnutls_session_t session, int type, void *ret) { const int siz = TLS_MSG_LEN; opaque concat[36]; size_t len; const char *mesg; digest_hd_st td_md5; digest_hd_st td_sha; gnutls_protocol_t ver = gnutls_protocol_get_version (session); int rc; if (ver < GNUTLS_TLS1_2) { rc = _...
293,794,743,664,403,460,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,912
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_handshake_hash_add_sent (gnutls_session_t session, gnutls_handshake_description_t type, opaque * dataptr, uint32_t datalen) { int ret; if ((ret = _gnutls_handshake_hash_pending (session)) < 0) { gnutls_assert (); return ret; } if (type != GNUTLS_HANDSHAKE_HELLO_REQUEST) ...
141,127,071,756,183,850,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,913
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_handshake_hash_buffers_clear (gnutls_session_t session) { _gnutls_hash_deinit (&session->internals.handshake_mac_handle_md5, NULL); _gnutls_hash_deinit (&session->internals.handshake_mac_handle_sha, NULL); _gnutls_handshake_buffer_clear (session); }
38,936,184,145,998,480,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,914
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_handshake_hash_pending (gnutls_session_t session) { size_t siz; int ret; opaque *data; if (session->internals.handshake_mac_handle_init == 0) { gnutls_assert (); return GNUTLS_E_INTERNAL_ERROR; } /* We check if there are pending data to hash. */ if ((ret = _gnutls_handshake_...
251,129,115,941,512,200,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,915
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
int _gnutls_negotiate_version( gnutls_session_t session, gnutls_protocol_t adv_version) { int ret; /* if we do not support that version */ if (_gnutls_version_is_supported (session, adv_version) == 0) { /* If he requested something we do not support * then we send him the highest we support. ...
35,006,182,576,797,160,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,916
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_read_client_hello (gnutls_session_t session, opaque * data, int datalen) { uint8_t session_id_len; int pos = 0, ret; uint16_t suite_size, comp_size; gnutls_protocol_t adv_version; int neg_version; int len = datalen; opaque rnd[TLS_RANDOM_SIZE], *suite_ptr, *comp_ptr; if (session->internal...
281,487,474,777,801,620,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,917
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_recv_finished (gnutls_session_t session) { uint8_t data[36], *vrfy; int data_size; int ret; int vrfysize; ret = _gnutls_recv_handshake (session, &vrfy, &vrfysize, GNUTLS_HANDSHAKE_FINISHED, MANDATORY_PACKET); if (ret < 0) { ERR ("recv finished int", ret); gnutls_assert ()...
21,200,338,649,407,780,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,918
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_send_empty_handshake (gnutls_session_t session, gnutls_handshake_description_t type, int again) { opaque data = 0; opaque *ptr; if (again == 0) ptr = &data; else ptr = NULL; return _gnutls_send_handshake (session, ptr, 0, type); }
118,412,732,443,409,110,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,919
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_send_finished (gnutls_session_t session, int again) { uint8_t data[36]; int ret; int data_size = 0; if (again == 0) { /* This is needed in order to hash all the required * messages. */ if ((ret = _gnutls_handshake_hash_pending (session)) < 0) { gnutls_assert (); r...
63,914,130,486,440,900,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,920
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_send_handshake (gnutls_session_t session, void *i_data, uint32_t i_datasize, gnutls_handshake_description_t type) { int ret; uint8_t *data; uint32_t datasize; int pos = 0; if (i_data == NULL && i_datasize == 0) { /* we are resuming a previously interrupted * send. */ ...
54,888,698,167,969,370,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,921
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_server_find_pk_algos_in_ciphersuites (const opaque * data, int datalen) { int j; gnutls_pk_algorithm_t algo = GNUTLS_PK_NONE, prev_algo = 0; gnutls_kx_algorithm_t kx; cipher_suite_st cs; if (datalen % 2 != 0) { gnutls_assert (); return GNUTLS_E_UNEXPECTED_PACKET_LENGTH; ...
128,659,461,644,250,890,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,922
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_server_select_comp_method (gnutls_session_t session, opaque * data, int datalen) { int x, i, j; uint8_t *comps; x = _gnutls_supported_compression_methods (session, &comps); if (x < 0) { gnutls_assert (); return x; } memset (&session->internals.compression_method, 0, siz...
11,501,034,097,969,095,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,923
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_set_server_random (gnutls_session_t session, uint8_t * rnd) { memcpy (session->security_parameters.server_random, rnd, TLS_RANDOM_SIZE); }
218,591,216,534,427,540,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,924
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_ssl3_finished (gnutls_session_t session, int type, opaque * ret) { const int siz = SSL_MSG_LEN; digest_hd_st td_md5; digest_hd_st td_sha; const char *mesg; int rc; rc = _gnutls_hash_copy (&td_md5, &session->internals.handshake_mac_handle_md5); if (rc < 0) { gnutls_assert (); retur...
65,511,753,567,232,200,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,925
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
_gnutls_tls_create_random (opaque * dst) { uint32_t tim; int ret; /* Use weak random numbers for the most of the * buffer except for the first 4 that are the * system's time. */ tim = time (NULL); /* generate server random value */ _gnutls_write_uint32 (tim, dst); ret = _gnutls_rnd (RND_NONCE,...
36,349,735,020,444,202,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,926
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
int _gnutls_user_hello_func( gnutls_session session, gnutls_protocol_t adv_version) { int ret; if (session->internals.user_hello_func != NULL) { ret = session->internals.user_hello_func( session); if (ret < 0) { gnutls_assert(); return ret; } /* Here we nee...
174,474,645,022,079,240,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,927
savannah
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
None
0
resume_copy_required_values (gnutls_session_t session) { /* get the new random values */ memcpy (session->internals.resumed_security_parameters. server_random, session->security_parameters.server_random, TLS_RANDOM_SIZE); memcpy (session->internals.resumed_security_parameters. client_random, session->...
330,257,690,946,717,530,000,000,000,000,000,000,000
gnutls_handshake.c
102,421,791,983,933,270,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record wit...
https://nvd.nist.gov/vuln/detail/CVE-2008-1950
17,928
libav
58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
vqavideo: return error if image size is not a multiple of block size The decoder assumes in various places that the image size is a multiple of the block size, and there is no obvious way to support odd sizes. Bailing out early if the header specifies a bad size avoids various errors later on. Fixes CVE-2012-0947. ...
0
static int decode_format80(GetByteContext *gb, int src_size, unsigned char *dest, int dest_size, int check_size) { int dest_index = 0; int count, opcode, start; int src_pos; unsigned char color; int i; start = bytestream2_tell(gb); while (bytestream2_tell(gb) - start < src_size) { ...
203,793,178,962,512,260,000,000,000,000,000,000,000
vqavideo.c
170,156,246,542,730,200,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-0947
Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil...
https://nvd.nist.gov/vuln/detail/CVE-2012-0947
17,929
libav
58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
vqavideo: return error if image size is not a multiple of block size The decoder assumes in various places that the image size is a multiple of the block size, and there is no obvious way to support odd sizes. Bailing out early if the header specifies a bad size avoids various errors later on. Fixes CVE-2012-0947. ...
0
static int vqa_decode_chunk(VqaContext *s) { unsigned int chunk_type; unsigned int chunk_size; int byte_skip; unsigned int index = 0; int i; unsigned char r, g, b; int index_shift; int res; int cbf0_chunk = -1; int cbfz_chunk = -1; int cbp0_chunk = -1; int cbpz_chunk = -...
212,217,309,902,338,230,000,000,000,000,000,000,000
vqavideo.c
170,156,246,542,730,200,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-0947
Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil...
https://nvd.nist.gov/vuln/detail/CVE-2012-0947
17,930
libav
58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
vqavideo: return error if image size is not a multiple of block size The decoder assumes in various places that the image size is a multiple of the block size, and there is no obvious way to support odd sizes. Bailing out early if the header specifies a bad size avoids various errors later on. Fixes CVE-2012-0947. ...
0
static int vqa_decode_frame(AVCodecContext *avctx, void *data, int *data_size, AVPacket *avpkt) { VqaContext *s = avctx->priv_data; int res; if (s->frame.data[0]) avctx->release_buffer(avctx, &s->frame); if (avctx->get_buffer(avctx, &s->f...
220,567,395,071,001,550,000,000,000,000,000,000,000
vqavideo.c
170,156,246,542,730,200,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-0947
Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil...
https://nvd.nist.gov/vuln/detail/CVE-2012-0947
17,931
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void pop_end(stroke_msg_t *msg, const char* label, stroke_end_t *end) { pop_string(msg, &end->address); pop_string(msg, &end->subnets); pop_string(msg, &end->sourceip); pop_string(msg, &end->dns); pop_string(msg, &end->auth); pop_string(msg, &end->auth2); pop_string(msg, &end->id); pop_string(msg, &end->...
210,746,954,125,106,750,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,932
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void pop_string(stroke_msg_t *msg, char **string) { if (*string == NULL) { return; } /* check for sanity of string pointer and string */ if (string < (char**)msg || string > (char**)((char*)msg + sizeof(stroke_msg_t)) || (unsigned long)*string < (unsigned long)((char*)msg->buffer - (char*)msg) || (...
219,963,372,204,856,000,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,933
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void print_pem_cert(FILE *out, certificate_t *cert) { chunk_t encoded; if (cert->get_encoding(cert, CERT_PEM, &encoded)) { fprintf(out, "%.*s", (int)encoded.len, encoded.ptr); free(encoded.ptr); } }
266,002,345,534,518,970,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,934
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_add_ca(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->add_ca.name); DBG1(DBG_CFG, "received stroke: add ca '%s'", msg->add_ca.name); pop_string(msg, &msg->add_ca.cacert); pop_string(msg, &msg->add_ca.crluri); pop_string(msg, &msg->add_ca.crluri2); ...
288,033,283,969,537,570,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,935
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_add_conn(private_stroke_socket_t *this, stroke_msg_t *msg) { pop_string(msg, &msg->add_conn.name); DBG1(DBG_CFG, "received stroke: add connection '%s'", msg->add_conn.name); DBG2(DBG_CFG, "conn %s", msg->add_conn.name); pop_end(msg, "left", &msg->add_conn.me); pop_end(msg, "right", &msg->add_co...
117,215,218,851,392,180,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,936
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_config(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { this->cred->cachecrl(this->cred, msg->config.cachecrl); }
314,211,353,853,571,600,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,937
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_counters(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->counters.name); if (msg->counters.reset) { this->counter->reset(this->counter, msg->counters.name); } else { this->counter->print(this->counter, out, msg->counters.name); } }
233,798,247,257,565,350,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,938
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_del_ca(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->del_ca.name); DBG1(DBG_CFG, "received stroke: delete ca '%s'", msg->del_ca.name); this->ca->del(this->ca, msg); }
329,693,688,249,452,580,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,939
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_del_conn(private_stroke_socket_t *this, stroke_msg_t *msg) { pop_string(msg, &msg->del_conn.name); DBG1(DBG_CFG, "received stroke: delete connection '%s'", msg->del_conn.name); this->config->del(this->config, msg); this->attribute->del_dns(this->attribute, msg); this->handler->del_attributes(th...
316,732,387,365,407,170,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,940
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_export(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->export.selector); if (msg->export.flags & EXPORT_X509) { enumerator_t *enumerator; identification_t *id; certificate_t *cert; id = identification_create_from_string(msg->export.selector); ...
167,923,078,491,625,440,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,941
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_initiate(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->initiate.name); DBG1(DBG_CFG, "received stroke: initiate '%s'", msg->initiate.name); this->control->initiate(this->control, msg, out); }
318,266,597,433,593,100,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,942
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_leases(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->leases.pool); pop_string(msg, &msg->leases.address); this->list->leases(this->list, msg, out); }
679,925,628,512,522,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,943
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_list(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { if (msg->list.flags & LIST_CAINFOS) { this->ca->list(this->ca, msg, out); } this->list->list(this->list, msg, out); }
223,671,912,975,313,080,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,944
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_loglevel(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { debug_t group; pop_string(msg, &(msg->loglevel.type)); DBG1(DBG_CFG, "received stroke: loglevel %d for %s", msg->loglevel.level, msg->loglevel.type); if (this->prevent_loglevel_changes) { DBG1(DBG_CFG, "prevent...
334,673,341,599,501,060,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,945
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_purge(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { if (msg->purge.flags & PURGE_OCSP) { lib->credmgr->flush_cache(lib->credmgr, CERT_X509_OCSP_RESPONSE); } if (msg->purge.flags & PURGE_CRLS) { lib->credmgr->flush_cache(lib->credmgr, CERT_X509_CRL); } if (msg->purge...
330,796,393,056,310,540,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,946
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_reread(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { this->cred->reread(this->cred, msg, out); }
59,564,100,363,330,970,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,947
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_route(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->route.name); DBG1(DBG_CFG, "received stroke: route '%s'", msg->route.name); this->control->route(this->control, msg, out); }
55,153,610,981,195,640,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,948
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_status(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out, bool all, bool wait) { pop_string(msg, &(msg->status.name)); this->list->status(this->list, msg, out, all, wait); }
188,755,309,457,937,640,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,949
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_terminate(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->terminate.name); DBG1(DBG_CFG, "received stroke: terminate '%s'", msg->terminate.name); this->control->terminate(this->control, msg, out); }
184,043,304,630,809,200,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,950
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_terminate_srcip(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->terminate_srcip.start); pop_string(msg, &msg->terminate_srcip.end); DBG1(DBG_CFG, "received stroke: terminate-srcip %s-%s", msg->terminate_srcip.start, msg->terminate_srcip.end); th...
57,182,975,899,190,050,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,951
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void stroke_unroute(private_stroke_socket_t *this, stroke_msg_t *msg, FILE *out) { pop_string(msg, &msg->terminate.name); DBG1(DBG_CFG, "received stroke: unroute '%s'", msg->route.name); this->control->unroute(this->control, msg, out); }
234,512,961,636,216,550,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,952
strongswan
0acd1ab4d08d53d80393b1a37b8781f6e7b2b996
https://git.strongswan.org/?p=strongswan
https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
None
0
static void sum_usage(FILE *out, int count, size_t bytes, int whitelisted) { fprintf(out, "Total memory usage: %zu\n", bytes); }
2,447,606,670,002,469,600,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5388
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-5388
17,953
openssl
392fa7a952e97d82eac6958c81ed1e256e6b8ca5
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
Keep old method in case of an unsupported protocol When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set the method to NULL. We didn't used to do that, and it breaks things. This is a regression introduced in 62f45cc27d07187b59551e4fad3db4e52ea73f2c. Keep the old method since the code is ...
0
int ssl23_accept(SSL *s) { BUF_MEM *buf; unsigned long Time=(unsigned long)time(NULL); void (*cb)(const SSL *ssl,int type,int val)=NULL; int ret= -1; int new_state,state; RAND_add(&Time,sizeof(Time),0); ERR_clear_error(); clear_sys_error(); if (s->info_callback != NULL) cb=s->info_callback; else if (s->c...
35,399,316,197,627,810,000,000,000,000,000,000,000
None
null
[]
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handsha...
https://nvd.nist.gov/vuln/detail/CVE-2014-3569
17,954
openssl
392fa7a952e97d82eac6958c81ed1e256e6b8ca5
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
Keep old method in case of an unsupported protocol When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set the method to NULL. We didn't used to do that, and it breaks things. This is a regression introduced in 62f45cc27d07187b59551e4fad3db4e52ea73f2c. Keep the old method since the code is ...
0
static const SSL_METHOD *ssl23_get_server_method(int ver) { #ifndef OPENSSL_NO_SSL2 if (ver == SSL2_VERSION) return(SSLv2_server_method()); #endif #ifndef OPENSSL_NO_SSL3 if (ver == SSL3_VERSION) return(SSLv3_server_method()); #endif if (ver == TLS1_VERSION) return(TLSv1_server_method()); else if (ver == TLS...
223,618,537,911,782,600,000,000,000,000,000,000,000
None
null
[]
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handsha...
https://nvd.nist.gov/vuln/detail/CVE-2014-3569
17,955
openssl
b82924741b4bd590da890619be671f4635e46c2b
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=b82924741b4bd590da890619be671f4635e46c2b
Keep old method in case of an unsupported protocol When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set the method to NULL. We didn't used to do that, and it breaks things. This is a regression introduced in 62f45cc27d07187b59551e4fad3db4e52ea73f2c. Keep the old method since the code is ...
0
static SSL_METHOD *ssl23_get_server_method(int ver) { #ifndef OPENSSL_NO_SSL2 if (ver == SSL2_VERSION) return(SSLv2_server_method()); #endif #ifndef OPENSSL_NO_SSL3 if (ver == SSL3_VERSION) return(SSLv3_server_method()); #endif if (ver == TLS1_VERSION) return(TLSv1_server_method()); else return(NULL); }
159,765,829,539,381,680,000,000,000,000,000,000,000
None
null
[]
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handsha...
https://nvd.nist.gov/vuln/detail/CVE-2014-3569
17,959
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit) { int extdatalen=0; unsigned char *orig = buf; unsigned char *ret = buf; /* don't add extensions for SSLv3 unless doing secure renegotiation */ if (s->client_version == SSL3_VERSION && !s->s3->send_connection_binding...
206,524,910,392,518,450,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,960
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
unsigned char *ssl_add_serverhello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit) { int extdatalen=0; unsigned char *orig = buf; unsigned char *ret = buf; #ifndef OPENSSL_NO_NEXTPROTONEG int next_proto_neg_seen; #endif /* don't add extensions for SSLv3, unless doing secure renegotiation */ if (s->vers...
76,602,906,540,445,020,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,961
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int ssl_check_clienthello_tlsext_early(SSL *s) { int ret=SSL_TLSEXT_ERR_NOACK; int al = SSL_AD_UNRECOGNIZED_NAME; #ifndef OPENSSL_NO_EC /* The handling of the ECPointFormats extension is done elsewhere, namely in * ssl3_choose_cipher in s3_lib.c. */ /* The handling of the EllipticCurves extension is done els...
225,909,370,080,466,800,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,962
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int ssl_check_serverhello_tlsext(SSL *s) { int ret=SSL_TLSEXT_ERR_NOACK; int al = SSL_AD_UNRECOGNIZED_NAME; #ifndef OPENSSL_NO_EC /* If we are client and using an elliptic curve cryptography cipher * suite, then if server returns an EC point formats lists extension * it must contain uncompressed. */ unsigne...
21,651,754,238,731,280,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,963
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) { unsigned short type; unsigned short size; unsigned short len; unsigned char *data = *p; int renegotiate_seen = 0; int sigalg_seen = 0; s->servername_done = 0; s->tlsext_status_type = -1; #ifndef OPENSSL_NO_NEXTPROT...
3,221,828,317,652,265,400,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,964
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int ssl_parse_serverhello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) { unsigned short length; unsigned short type; unsigned short size; unsigned char *data = *p; int tlsext_servername = 0; int renegotiate_seen = 0; #ifndef OPENSSL_NO_NEXTPROTONEG s->s3->next_proto_neg_seen = 0; #endif ...
229,867,559,169,355,040,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,965
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int ssl_prepare_clienthello_tlsext(SSL *s) { #ifndef OPENSSL_NO_EC /* If we are client and using an elliptic curve cryptography cipher suite, send the point formats * and elliptic curves we support. */ int using_ecc = 0; int i; unsigned char *j; unsigned long alg_k, alg_a; STACK_OF(SSL_CIPHER) *cipher_stack...
45,937,991,802,660,030,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,966
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int ssl_prepare_serverhello_tlsext(SSL *s) { #ifndef OPENSSL_NO_EC /* If we are server and using an ECC cipher suite, send the point formats we support * if the client sent us an ECPointsFormat extension. Note that the server is not * supposed to send an EllipticCurves extension. */ unsigned long alg_k = s-...
103,520,033,582,861,430,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,967
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int tls1_ec_curve_id2nid(int curve_id) { /* ECC curves from draft-ietf-tls-ecc-12.txt (Oct. 17, 2005) */ if ((curve_id < 1) || ((unsigned int)curve_id > sizeof(nid_list)/sizeof(nid_list[0]))) return 0; return nid_list[curve_id-1]; }
166,261,407,781,454,040,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,968
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int tls1_ec_nid2curve_id(int nid) { /* ECC curves from draft-ietf-tls-ecc-12.txt (Oct. 17, 2005) */ switch (nid) { case NID_sect163k1: /* sect163k1 (1) */ return 1; case NID_sect163r1: /* sect163r1 (2) */ return 2; case NID_sect163r2: /* sect163r2 (3) */ return 3; case NID_sect193r1: /* sect193r1 (4) */ ...
276,618,760,653,842,230,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,969
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int tls1_process_sigalgs(SSL *s, const unsigned char *data, int dsize) { int i, idx; const EVP_MD *md; CERT *c = s->cert; /* Extension ignored for TLS versions below 1.2 */ if (TLS1_get_version(s) < TLS1_2_VERSION) return 1; /* Should never happen */ if (!c) return 0; c->pkeys[SSL_PKEY_DSA_SIGN].digest = ...
267,372,548,287,716,850,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,970
openssl
7fd4ce6a997be5f5c9e744ac527725c2850de203
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
0
int tls1_process_ticket(SSL *s, unsigned char *session_id, int len, const unsigned char *limit, SSL_SESSION **ret) { /* Point after session ID in client hello */ const unsigned char *p = session_id + len; unsigned short i; *ret = NULL; s->tlsext_ticket_expected = 0; /* If tickets disabled behave as if no ti...
81,278,578,361,818,500,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
17,971
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
add_io_cb (engine_gpgsm_t gpgsm, iocb_data_t *iocbd, gpgme_io_cb_t handler) { gpgme_error_t err; TRACE_BEG2 (DEBUG_ENGINE, "engine-gpgsm:add_io_cb", gpgsm, "fd %d, dir %d", iocbd->fd, iocbd->dir); err = (*gpgsm->io_cbs.add) (gpgsm->io_cbs.add_priv, iocbd->fd, iocbd->dir, handler, ...
331,661,830,818,791,130,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,972
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
default_inq_cb (engine_gpgsm_t gpgsm, const char *line) { if (!strncmp (line, "PINENTRY_LAUNCHED", 17) && (line[17]==' '||!line[17])) { _gpgme_allow_set_foreground_window ((pid_t)strtoul (line+17, NULL, 10)); } return 0; }
252,232,124,654,990,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,973
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_assuan_simple_command (assuan_context_t ctx, char *cmd, engine_status_handler_t status_fnc, void *status_fnc_value) { gpg_error_t err; char *line; size_t linelen; err = assuan_write_line (ctx, cmd); if (err) return err; do { err = assuan_read_line (ctx, &line, &linelen)...
130,775,451,994,638,840,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,974
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_cancel (void *engine) { engine_gpgsm_t gpgsm = engine; if (!gpgsm) return gpg_error (GPG_ERR_INV_VALUE); if (gpgsm->status_cb.fd != -1) _gpgme_io_close (gpgsm->status_cb.fd); if (gpgsm->input_cb.fd != -1) _gpgme_io_close (gpgsm->input_cb.fd); if (gpgsm->output_cb.fd != -1) _gpgme_io_cl...
142,762,845,927,308,470,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,975
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_clear_fd (engine_gpgsm_t gpgsm, fd_type_t fd_type) { #if !USE_DESCRIPTOR_PASSING switch (fd_type) { case INPUT_FD: _gpgme_io_close (gpgsm->input_cb.fd); break; case OUTPUT_FD: _gpgme_io_close (gpgsm->output_cb.fd); break; case MESSAGE_FD: _gpgme_io_close (gpgsm->mes...
253,924,727,189,050,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,976
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_decrypt (void *engine, gpgme_data_t ciph, gpgme_data_t plain) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; if (!gpgsm) return gpg_error (GPG_ERR_INV_VALUE); gpgsm->input_cb.data = ciph; err = gpgsm_set_fd (gpgsm, INPUT_FD, map_data_enc (gpgsm->input_cb.data)); if (err) return gpg_erro...
287,112,041,077,714,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,977
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_delete (void *engine, gpgme_key_t key, int allow_secret) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; char *fpr = key->subkeys ? key->subkeys->fpr : NULL; char *linep = fpr; char *line; int length = 8; /* "DELKEYS " */ if (!fpr) return gpg_error (GPG_ERR_INV_VALUE); while (*linep) ...
118,600,996,471,402,810,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,978
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_encrypt (void *engine, gpgme_key_t recp[], gpgme_encrypt_flags_t flags, gpgme_data_t plain, gpgme_data_t ciph, int use_armor) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; if (!gpgsm) return gpg_error (GPG_ERR_INV_VALUE); if (!recp) return gpg_error (GPG_ERR_NOT_IMPLEMENTED); if ...
148,167,530,578,311,550,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,979
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_export (void *engine, const char *pattern, gpgme_export_mode_t mode, gpgme_data_t keydata, int use_armor) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err = 0; char *cmd; if (!gpgsm) return gpg_error (GPG_ERR_INV_VALUE); if (mode) return gpg_error (GPG_ERR_NOT_SUPPORTED); if (!patt...
287,779,340,679,816,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,980
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_export_ext (void *engine, const char *pattern[], gpgme_export_mode_t mode, gpgme_data_t keydata, int use_armor) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err = 0; char *line; /* Length is "EXPORT " + p + '\0'. */ int length = 7 + 1; char *linep; if (!gpgsm) return gpg_error (GPG_ERR_I...
210,580,287,797,479,820,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,981
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_genkey (void *engine, gpgme_data_t help_data, int use_armor, gpgme_data_t pubkey, gpgme_data_t seckey) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; if (!gpgsm || !pubkey || seckey) return gpg_error (GPG_ERR_INV_VALUE); gpgsm->input_cb.data = help_data; err = gpgsm_set_fd (gpgsm, INPU...
121,987,477,556,155,250,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,982
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_get_req_version (void) { return "2.0.4"; }
306,259,557,145,575,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,983
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_get_version (const char *file_name) { return _gpgme_get_program_version (file_name ? file_name : _gpgme_get_default_gpgsm_name ()); }
243,396,165,840,940,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,984
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_getauditlog (void *engine, gpgme_data_t output, unsigned int flags) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err = 0; if (!gpgsm || !output) return gpg_error (GPG_ERR_INV_VALUE); #if USE_DESCRIPTOR_PASSING gpgsm->output_cb.data = output; err = gpgsm_set_fd (gpgsm, OUTPUT_FD, 0); if (err) ...
241,655,934,246,929,870,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,985
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_import (void *engine, gpgme_data_t keydata, gpgme_key_t *keyarray) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; gpgme_data_encoding_t dataenc; int idx; if (!gpgsm) return gpg_error (GPG_ERR_INV_VALUE); if (keydata && keyarray) return gpg_error (GPG_ERR_INV_VALUE); /* Only one is allow...
212,263,734,964,397,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,986
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_io_event (void *engine, gpgme_event_io_t type, void *type_data) { engine_gpgsm_t gpgsm = engine; TRACE3 (DEBUG_ENGINE, "gpgme:gpgsm_io_event", gpgsm, "event %p, type %d, type_data %p", gpgsm->io_cbs.event, type, type_data); if (gpgsm->io_cbs.event) (*gpgsm->io_cbs.event) (gpgsm->io_...
151,143,986,515,847,850,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,987
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_keylist (void *engine, const char *pattern, int secret_only, gpgme_keylist_mode_t mode) { engine_gpgsm_t gpgsm = engine; char *line; gpgme_error_t err; int list_mode = 0; if (mode & GPGME_KEYLIST_MODE_LOCAL) list_mode |= 1; if (mode & GPGME_KEYLIST_MODE_EXTERN) list_mode |= 2; if (...
121,175,099,573,277,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,988
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_new (void **engine, const char *file_name, const char *home_dir) { gpgme_error_t err = 0; engine_gpgsm_t gpgsm; const char *pgmname; const char *argv[5]; int argc; #if !USE_DESCRIPTOR_PASSING int fds[2]; int child_fds[4]; #endif char *dft_display = NULL; char dft_ttyname[64]; char *dft_ttytype...
162,273,337,165,806,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,989
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_passwd (void *engine, gpgme_key_t key, unsigned int flags) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; char *line; if (!key || !key->subkeys || !key->subkeys->fpr) return gpg_error (GPG_ERR_INV_CERT_OBJ); if (asprintf (&line, "PASSWD -- %s", key->subkeys->fpr) < 0) return gpg_error_fro...
58,515,961,705,034,090,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,990
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_release (void *engine) { engine_gpgsm_t gpgsm = engine; if (!gpgsm) return; gpgsm_cancel (engine); free (gpgsm->colon.attic.line); free (gpgsm); }
42,721,730,485,193,720,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,991
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_reset (void *engine) { engine_gpgsm_t gpgsm = engine; /* IF we have an active connection we must send a reset because we need to reset the list of signers. Note that RESET does not reset OPTION commands. */ return (gpgsm->assuan_ctx ? gpgsm_assuan_simple_command (gpgsm->assuan_ctx, "RE...
187,864,492,754,090,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,992
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_set_colon_line_handler (void *engine, engine_colon_line_handler_t fnc, void *fnc_value) { engine_gpgsm_t gpgsm = engine; gpgsm->colon.fnc = fnc; gpgsm->colon.fnc_value = fnc_value; gpgsm->colon.any = 0; return 0; }
319,998,747,032,196,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,993
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_set_io_cbs (void *engine, gpgme_io_cbs_t io_cbs) { engine_gpgsm_t gpgsm = engine; gpgsm->io_cbs = *io_cbs; }
183,326,919,622,753,420,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,994
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_set_locale (void *engine, int category, const char *value) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; char *optstr; char *catstr; /* FIXME: If value is NULL, we need to reset the option to default. But we can't do this. So we error out here. GPGSM needs support for this. */ if (...
304,227,267,755,027,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,995
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_sign (void *engine, gpgme_data_t in, gpgme_data_t out, gpgme_sig_mode_t mode, int use_armor, int use_textmode, int include_certs, gpgme_ctx_t ctx /* FIXME */) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; char *assuan_cmd; int i; gpgme_key_t key; if (!gpgsm) return gpg_error (GPG_...
143,084,456,875,846,790,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,996
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
gpgsm_verify (void *engine, gpgme_data_t sig, gpgme_data_t signed_text, gpgme_data_t plaintext) { engine_gpgsm_t gpgsm = engine; gpgme_error_t err; if (!gpgsm) return gpg_error (GPG_ERR_INV_VALUE); gpgsm->input_cb.data = sig; err = gpgsm_set_fd (gpgsm, INPUT_FD, map_data_enc (gpgsm->input_cb.data...
330,769,172,623,098,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,997
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
map_data_enc (gpgme_data_t d) { switch (gpgme_data_get_encoding (d)) { case GPGME_DATA_ENCODING_NONE: break; case GPGME_DATA_ENCODING_BINARY: return "--binary"; case GPGME_DATA_ENCODING_BASE64: return "--base64"; case GPGME_DATA_ENCODING_ARMOR: return "--armor"; default...
288,296,748,968,206,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,998
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
set_recipients (engine_gpgsm_t gpgsm, gpgme_key_t recp[]) { gpgme_error_t err = 0; assuan_context_t ctx = gpgsm->assuan_ctx; char *line; int linelen; int invalid_recipients = 0; int i; linelen = 10 + 40 + 1; /* "RECIPIENT " + guess + '\0'. */ line = malloc (10 + 40 + 1); if (!line) return gpg_er...
153,758,833,527,488,360,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
17,999
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
_uiserver_decrypt (void *engine, int verify, gpgme_data_t ciph, gpgme_data_t plain) { engine_uiserver_t uiserver = engine; gpgme_error_t err; const char *protocol; char *cmd; if (!uiserver) return gpg_error (GPG_ERR_INV_VALUE); if (uiserver->protocol == GPGME_PROTOCOL_DEFAULT) protocol = ""; ...
288,341,916,667,129,550,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,000
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
add_io_cb (engine_uiserver_t uiserver, iocb_data_t *iocbd, gpgme_io_cb_t handler) { gpgme_error_t err; TRACE_BEG2 (DEBUG_ENGINE, "engine-uiserver:add_io_cb", uiserver, "fd %d, dir %d", iocbd->fd, iocbd->dir); err = (*uiserver->io_cbs.add) (uiserver->io_cbs.add_priv, iocbd->fd, iocbd->dir, ...
60,607,498,703,830,330,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564