idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
18,001
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
close_notify_handler (int fd, void *opaque) { engine_uiserver_t uiserver = opaque; assert (fd != -1); if (uiserver->status_cb.fd == fd) { if (uiserver->status_cb.tag) (*uiserver->io_cbs.remove) (uiserver->status_cb.tag); uiserver->status_cb.fd = -1; uiserver->status_cb.tag = NULL; } ...
42,468,700,215,489,030,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,002
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
default_inq_cb (engine_uiserver_t uiserver, const char *line) { if (!strncmp (line, "PINENTRY_LAUNCHED", 17) && (line[17]==' '||!line[17])) { _gpgme_allow_set_foreground_window ((pid_t)strtoul (line+17, NULL, 10)); } return 0; }
16,554,913,243,925,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,003
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
set_recipients (engine_uiserver_t uiserver, gpgme_key_t recp[]) { gpgme_error_t err = 0; assuan_context_t ctx = uiserver->assuan_ctx; char *line; int linelen; int invalid_recipients = 0; int i; linelen = 10 + 40 + 1; /* "RECIPIENT " + guess + '\0'. */ line = malloc (10 + 40 + 1); if (!line) retu...
329,127,835,748,767,840,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,004
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
start (engine_uiserver_t uiserver, const char *command) { gpgme_error_t err; int fdlist[5]; int nfds; /* We need to know the fd used by assuan for reads. We do this by using the assumption that the first returned fd from assuan_get_active_fds() is always this one. */ nfds = assuan_get_active_fds ...
146,960,464,317,599,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,005
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_decrypt (void *engine, gpgme_data_t ciph, gpgme_data_t plain) { return _uiserver_decrypt (engine, 0, ciph, plain); }
162,226,386,718,517,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,006
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_decrypt_verify (void *engine, gpgme_data_t ciph, gpgme_data_t plain) { return _uiserver_decrypt (engine, 1, ciph, plain); }
286,323,646,885,691,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,007
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_encrypt (void *engine, gpgme_key_t recp[], gpgme_encrypt_flags_t flags, gpgme_data_t plain, gpgme_data_t ciph, int use_armor) { engine_uiserver_t uiserver = engine; gpgme_error_t err; const char *protocol; char *cmd; if (!uiserver) return gpg_error (GPG_ERR_INV_VALUE); if (uiserver->protoc...
189,179,726,770,884,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,008
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_get_req_version (void) { return "1.0"; }
166,205,930,386,827,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,009
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_get_version (const char *file_name) { return strdup ("1.0"); }
338,336,535,798,946,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,010
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_io_event (void *engine, gpgme_event_io_t type, void *type_data) { engine_uiserver_t uiserver = engine; TRACE3 (DEBUG_ENGINE, "gpgme:uiserver_io_event", uiserver, "event %p, type %d, type_data %p", uiserver->io_cbs.event, type, type_data); if (uiserver->io_cbs.event) (*uiserver->i...
221,300,454,721,176,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,011
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_new (void **engine, const char *file_name, const char *home_dir) { gpgme_error_t err = 0; engine_uiserver_t uiserver; char *dft_display = NULL; char dft_ttyname[64]; char *dft_ttytype = NULL; char *optstr; uiserver = calloc (1, sizeof *uiserver); if (!uiserver) return gpg_error_from_syserr...
133,663,850,703,832,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,012
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_release (void *engine) { engine_uiserver_t uiserver = engine; if (!uiserver) return; uiserver_cancel (engine); free (uiserver->colon.attic.line); free (uiserver); }
36,441,902,801,101,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,013
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_reset (void *engine) { engine_uiserver_t uiserver = engine; /* We must send a reset because we need to reset the list of signers. Note that RESET does not reset OPTION commands. */ return uiserver_assuan_simple_command (uiserver->assuan_ctx, "RESET", NULL, NULL); }
149,507,494,551,353,250,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,014
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_set_colon_line_handler (void *engine, engine_colon_line_handler_t fnc, void *fnc_value) { engine_uiserver_t uiserver = engine; uiserver->colon.fnc = fnc; uiserver->colon.fnc_value = fnc_value; uiserver->colon.any = 0; return 0; }
281,385,938,705,010,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,015
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_set_io_cbs (void *engine, gpgme_io_cbs_t io_cbs) { engine_uiserver_t uiserver = engine; uiserver->io_cbs = *io_cbs; }
37,066,490,825,633,585,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,016
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_set_locale (void *engine, int category, const char *value) { engine_uiserver_t uiserver = engine; gpgme_error_t err; char *optstr; char *catstr; /* FIXME: If value is NULL, we need to reset the option to default. But we can't do this. So we error out here. UISERVER needs support for this...
142,750,655,169,407,190,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,017
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_set_protocol (void *engine, gpgme_protocol_t protocol) { engine_uiserver_t uiserver = engine; if (protocol != GPGME_PROTOCOL_OpenPGP && protocol != GPGME_PROTOCOL_CMS && protocol != GPGME_PROTOCOL_DEFAULT) return gpg_error (GPG_ERR_INV_VALUE); uiserver->protocol = protocol; return 0; ...
161,503,156,793,152,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,018
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_set_status_handler (void *engine, engine_status_handler_t fnc, void *fnc_value) { engine_uiserver_t uiserver = engine; uiserver->status.fnc = fnc; uiserver->status.fnc_value = fnc_value; }
51,068,342,968,053,490,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,019
gnupg
2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
None
0
uiserver_verify (void *engine, gpgme_data_t sig, gpgme_data_t signed_text, gpgme_data_t plaintext) { engine_uiserver_t uiserver = engine; gpgme_error_t err; const char *protocol; char *cmd; if (!uiserver) return gpg_error (GPG_ERR_INV_VALUE); if (uiserver->protocol == GPGME_PROTOCOL_DEFAULT) ...
98,984,404,341,073,860,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
18,039
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num) { int i,first,len=0,c, use_bn; char ftmp[24], *tmp = ftmp; int tmpsize = sizeof ftmp; const char *p; unsigned long l; BIGNUM *bl = NULL; if (num == 0) return(0); else if (num == -1) num=strlen(buf); p=buf; c= *(p++); num--; i...
65,836,486,965,329,460,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,040
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
int OBJ_add_object(const ASN1_OBJECT *obj) { ASN1_OBJECT *o; ADDED_OBJ *ao[4]={NULL,NULL,NULL,NULL},*aop; int i; if (added == NULL) if (!init_added()) return(0); if ((o=OBJ_dup(obj)) == NULL) goto err; if (!(ao[ADDED_NID]=(ADDED_OBJ *)OPENSSL_malloc(sizeof(ADDED_OBJ)))) goto err2; if ((o->length != 0) && (ob...
224,293,102,887,864,670,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,041
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
const void *OBJ_bsearch_(const void *key, const void *base, int num, int size, int (*cmp)(const void *, const void *)) { return OBJ_bsearch_ex_(key, base, num, size, cmp, 0); }
22,613,311,200,802,340,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,042
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
void OBJ_cleanup(void) { if (obj_cleanup_defer) { obj_cleanup_defer = 2; return ; } if (added == NULL) return; lh_ADDED_OBJ_down_load(added) = 0; lh_ADDED_OBJ_doall(added,LHASH_DOALL_FN(cleanup1)); /* zero counters */ lh_ADDED_OBJ_doall(added,LHASH_DOALL_FN(cleanup2)); /* set counters */ lh_ADDED_OBJ_doa...
243,530,927,313,109,500,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,043
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
int OBJ_ln2nid(const char *s) { ASN1_OBJECT o; const ASN1_OBJECT *oo= &o; ADDED_OBJ ad,*adp; const unsigned int *op; o.ln=s; if (added != NULL) { ad.type=ADDED_LNAME; ad.obj= &o; adp=lh_ADDED_OBJ_retrieve(added,&ad); if (adp != NULL) return (adp->obj->nid); } op=OBJ_bsearch_ln(&oo, ln_objs, NUM_LN)...
109,520,337,637,289,240,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,044
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
int OBJ_new_nid(int num) { int i; i=new_nid; new_nid+=num; return(i); }
126,584,698,706,737,540,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,045
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
const char *OBJ_nid2ln(int n) { ADDED_OBJ ad,*adp; ASN1_OBJECT ob; if ((n >= 0) && (n < NUM_NID)) { if ((n != NID_undef) && (nid_objs[n].nid == NID_undef)) { OBJerr(OBJ_F_OBJ_NID2LN,OBJ_R_UNKNOWN_NID); return(NULL); } return(nid_objs[n].ln); } else if (added == NULL) return(NULL); else { ...
302,469,624,253,062,800,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,046
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
ASN1_OBJECT *OBJ_nid2obj(int n) { ADDED_OBJ ad,*adp; ASN1_OBJECT ob; if ((n >= 0) && (n < NUM_NID)) { if ((n != NID_undef) && (nid_objs[n].nid == NID_undef)) { OBJerr(OBJ_F_OBJ_NID2OBJ,OBJ_R_UNKNOWN_NID); return(NULL); } return((ASN1_OBJECT *)&(nid_objs[n])); } else if (added == NULL) return...
217,907,962,691,017,240,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,047
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
const char *OBJ_nid2sn(int n) { ADDED_OBJ ad,*adp; ASN1_OBJECT ob; if ((n >= 0) && (n < NUM_NID)) { if ((n != NID_undef) && (nid_objs[n].nid == NID_undef)) { OBJerr(OBJ_F_OBJ_NID2SN,OBJ_R_UNKNOWN_NID); return(NULL); } return(nid_objs[n].sn); } else if (added == NULL) return(NULL); else { ...
107,203,578,039,189,860,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,048
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
int OBJ_obj2nid(const ASN1_OBJECT *a) { const unsigned int *op; ADDED_OBJ ad,*adp; if (a == NULL) return(NID_undef); if (a->nid != 0) return(a->nid); if (added != NULL) { ad.type=ADDED_DATA; ad.obj=(ASN1_OBJECT *)a; /* XXX: ugly but harmless */ adp=lh_ADDED_OBJ_retrieve(added,&ad); if (adp != NULL...
65,757,101,420,661,420,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,049
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
int OBJ_sn2nid(const char *s) { ASN1_OBJECT o; const ASN1_OBJECT *oo= &o; ADDED_OBJ ad,*adp; const unsigned int *op; o.sn=s; if (added != NULL) { ad.type=ADDED_SNAME; ad.obj= &o; adp=lh_ADDED_OBJ_retrieve(added,&ad); if (adp != NULL) return (adp->obj->nid); } op=OBJ_bsearch_sn(&oo, sn_objs, NUM_SN)...
233,494,917,190,141,160,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,050
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
ASN1_OBJECT *OBJ_txt2obj(const char *s, int no_name) { int nid = NID_undef; ASN1_OBJECT *op=NULL; unsigned char *buf; unsigned char *p; const unsigned char *cp; int i, j; if(!no_name) { if( ((nid = OBJ_sn2nid(s)) != NID_undef) || ((nid = OBJ_ln2nid(s)) != NID_undef) ) return OBJ_nid2obj(nid); } /...
56,937,766,285,021,620,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,051
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
static void cleanup1_doall(ADDED_OBJ *a) { a->obj->nid=0; a->obj->flags|=ASN1_OBJECT_FLAG_DYNAMIC| ASN1_OBJECT_FLAG_DYNAMIC_STRINGS| ASN1_OBJECT_FLAG_DYNAMIC_DATA; }
44,901,614,097,829,360,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,052
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
static void cleanup2_doall(ADDED_OBJ *a) { a->obj->nid++; }
160,245,766,260,476,600,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,053
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
static void cleanup3_doall(ADDED_OBJ *a) { if (--a->obj->nid == 0) ASN1_OBJECT_free(a->obj); OPENSSL_free(a); }
221,157,234,779,384,100,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,054
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
static int init_added(void) { if (added != NULL) return(1); added=lh_ADDED_OBJ_new(); return(added != NULL); }
5,453,128,588,332,935,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,055
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
static int ln_cmp(const ASN1_OBJECT * const *a, const unsigned int *b) { return(strcmp((*a)->ln,nid_objs[*b].ln)); }
310,475,511,017,899,660,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,056
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
static int obj_cmp(const ASN1_OBJECT * const *ap, const unsigned int *bp) { int j; const ASN1_OBJECT *a= *ap; const ASN1_OBJECT *b= &nid_objs[*bp]; j=(a->length - b->length); if (j) return(j); return(memcmp(a->data,b->data,a->length)); }
91,718,641,227,580,100,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,057
openssl
0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
Fix OID handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
0
static int sn_cmp(const ASN1_OBJECT * const *a, const unsigned int *b) { return(strcmp((*a)->sn,nid_objs[*b].sn)); }
239,435,481,505,633,370,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-3508
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading...
https://nvd.nist.gov/vuln/detail/CVE-2014-3508
18,071
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
CreateOK(struct ubik_trans *ut, afs_int32 cid, afs_int32 oid, afs_int32 flag, int admin) { if (restricted && !admin) return 0; if (flag & PRFOREIGN) { /* Foreign users are recognized by the '@' sign and * not by the PRFOREIGN flag. */ return 0; } else if (flag & PRGRP) { /* Allow anonymous group ...
123,984,483,653,729,030,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,072
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_AddToGroup(struct rx_call *call, afs_int32 aid, afs_int32 gid) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = addToGroup(call, aid, gid, &cid); osi_auditU(call, PTS_AdToGrpEvent, code, AUD_ID, gid, AUD_ID, aid, AUD_END); ViceLog(5, ("PTS_AddToGroup: code %d cid %d gid %d aid %d\n...
110,675,872,848,897,040,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,073
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_Delete(struct rx_call *call, afs_int32 aid) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = Delete(call, aid, &cid); osi_auditU(call, PTS_DelEvent, code, AUD_ID, aid, AUD_END); ViceLog(5, ("PTS_Delete: code %d cid %d aid %d\n", code, cid, aid)); return code; }
245,356,607,880,175,400,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,074
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_DumpEntry(struct rx_call *call, afs_int32 apos, struct prdebugentry *aentry) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = dumpEntry(call, apos, aentry, &cid); osi_auditU(call, PTS_DmpEntEvent, code, AUD_LONG, apos, AUD_END); ViceLog(125, ("PTS_DumpEntry: code %d cid %d apos %d\n...
243,567,902,610,454,400,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,075
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_GetCPS2(struct rx_call *call, afs_int32 aid, afs_int32 ahost, prlist *alist, afs_int32 *over) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = getCPS2(call, aid, ahost, alist, over, &cid); osi_auditU(call, PTS_GetCPS2Event, code, AUD_ID, aid, AUD_HOST, htonl(ahost), AUD_END); ...
143,583,605,789,451,930,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,076
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_GetHostCPS(struct rx_call *call, afs_int32 ahost, prlist *alist, afs_int32 *over) { afs_int32 code; code = getHostCPS(call, ahost, alist, over); osi_auditU(call, PTS_GetHCPSEvent, code, AUD_HOST, htonl(ahost), AUD_END); ViceLog(125, ("PTS_GetHostCPS: code %d ahost %d\n", code, ahost)); ...
222,905,670,463,556,960,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,077
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_IDToName(struct rx_call *call, idlist *aid, namelist *aname) { afs_int32 code; code = idToName(call, aid, aname); osi_auditU(call, PTS_IdToNmEvent, code, AUD_END); ViceLog(125, ("PTS_IDToName: code %d\n", code)); return code; }
9,686,726,417,275,526,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,078
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_INewEntry(struct rx_call *call, char aname[], afs_int32 aid, afs_int32 oid) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = iNewEntry(call, aname, aid, oid, &cid); osi_auditU(call, PTS_INewEntEvent, code, AUD_ID, aid, AUD_STR, aname, AUD_ID, oid, AUD_END); ViceLog(5, ("PTS_INewEnt...
285,409,614,843,256,740,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,079
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_IsAMemberOf(struct rx_call *call, afs_int32 uid, afs_int32 gid, afs_int32 *flag) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = isAMemberOf(call, uid, gid, flag, &cid); osi_auditU(call, PTS_IsMemOfEvent, code, AUD_LONG, uid, AUD_LONG, gid, AUD_END); ViceLog(125, ("PTS_IsAMember...
38,657,036,724,021,615,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,080
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_ListElements(struct rx_call *call, afs_int32 aid, prlist *alist, afs_int32 *over) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = listElements(call, aid, alist, over, &cid); osi_auditU(call, PTS_LstEleEvent, code, AUD_ID, aid, AUD_END); ViceLog(125, ("PTS_ListElements: code %d cid %d a...
127,038,985,058,909,720,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,081
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_ListEntries(struct rx_call *call, afs_int32 flag, afs_int32 startindex, prentries *bulkentries, afs_int32 *nextstartindex) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = listEntries(call, flag, startindex, bulkentries, nextstartindex, &cid); osi_auditU(call, PTS_LstEntsEvent, code, AUD_LON...
311,876,981,623,619,050,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,082
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_ListEntry(struct rx_call *call, afs_int32 aid, struct prcheckentry *aentry) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = listEntry(call, aid, aentry, &cid); osi_auditU(call, PTS_LstEntEvent, code, AUD_ID, aid, AUD_END); ViceLog(125, ("PTS_ListEntry: code %d cid %d aid %d\n", code, cid,...
258,757,220,746,595,100,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,083
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_ListMax(struct rx_call *call, afs_int32 *uid, afs_int32 *gid) { afs_int32 code; code = listMax(call, uid, gid); osi_auditU(call, PTS_LstMaxEvent, code, AUD_END); ViceLog(125, ("PTS_ListMax: code %d\n", code)); return code; }
234,744,210,236,967,370,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,084
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_ListOwned(struct rx_call *call, afs_int32 aid, prlist *alist, afs_int32 *lastP) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = listOwned(call, aid, alist, lastP, &cid); osi_auditU(call, PTS_LstOwnEvent, code, AUD_ID, aid, AUD_END); ViceLog(125, ("PTS_ListOwned: code %d cid %d aid ...
114,568,692,083,154,500,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,085
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_NameToID(struct rx_call *call, namelist *aname, idlist *aid) { afs_int32 code; code = nameToID(call, aname, aid); osi_auditU(call, PTS_NmToIdEvent, code, AUD_END); ViceLog(125, ("PTS_NameToID: code %d\n", code)); return code; }
204,349,572,782,443,900,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,086
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_NewEntry(struct rx_call *call, char aname[], afs_int32 flag, afs_int32 oid, afs_int32 *aid) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = newEntry(call, aname, flag, oid, aid, &cid); osi_auditU(call, PTS_NewEntEvent, code, AUD_ID, *aid, AUD_STR, aname, AUD_ID, oid, AUD_END); ...
124,149,658,881,570,070,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,087
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_RemoveFromGroup(struct rx_call *call, afs_int32 aid, afs_int32 gid) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = removeFromGroup(call, aid, gid, &cid); osi_auditU(call, PTS_RmFmGrpEvent, code, AUD_ID, gid, AUD_ID, aid, AUD_END); ViceLog(5, ("PTS_RemoveFromGroup: code %d cid %d ...
200,149,460,538,600,800,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,088
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_SetFieldsEntry(struct rx_call *call, afs_int32 id, afs_int32 mask, /* specify which fields to update */ afs_int32 flags, afs_int32 ngroups, afs_int32 nusers, afs_int32 spare1, afs_int32 spare2) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = setFieldsEntry(call, id, mask, fla...
194,205,480,016,617,570,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,089
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_SetMax(struct rx_call *call, afs_int32 aid, afs_int32 gflag) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = setMax(call, aid, gflag, &cid); osi_auditU(call, PTS_SetMaxEvent, code, AUD_ID, aid, AUD_LONG, gflag, AUD_END); ViceLog(125, ("PTS_SetMax: code %d cid %d aid %d gflag %d\n"...
281,772,193,209,422,260,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,090
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_UpdateEntry(struct rx_call *call, afs_int32 aid, char *name, struct PrUpdateEntry *uentry) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = UpdateEntry(call, aid, name, uentry, &cid); osi_auditU(call, PTS_UpdEntEvent, code, AUD_ID, aid, AUD_STR, name, AUD_END); ViceLog(5, ("PTS_Up...
215,583,493,554,766,260,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,091
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
SPR_WhereIsIt(struct rx_call *call, afs_int32 aid, afs_int32 *apos) { afs_int32 code; afs_int32 cid = ANONYMOUSID; code = whereIsIt(call, aid, apos, &cid); osi_auditU(call, PTS_WheIsItEvent, code, AUD_ID, aid, AUD_LONG, *apos, AUD_END); ViceLog(125, ("PTS_WhereIsIt: code %d cid %d aid %d ap...
249,734,654,293,355,540,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,092
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
UpdateEntry(struct rx_call *call, afs_int32 aid, char *name, struct PrUpdateEntry *uentry, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; struct prentry tentry; afs_int32 loc; int id = 0; code = Initdb(); if (code) return code; if (code != PRSUCCESS) return code; if...
146,016,365,989,752,650,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,093
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
WhoIsThis(struct rx_call *acall, struct ubik_trans *at, afs_int32 *aid) { int foreign = 0; /* aid is set to the identity of the caller, if known, else ANONYMOUSID */ /* returns -1 and sets aid to ANONYMOUSID on any failure */ struct rx_connection *tconn; afs_int32 code; char tcell[MAXKTCREALMLEN...
185,189,507,613,728,360,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,094
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
WhoIsThisWithName(struct rx_call *acall, struct ubik_trans *at, afs_int32 *aid, char *aname) { /* aid is set to the identity of the caller, if known, else ANONYMOUSID */ /* returns -1 and sets aid to ANONYMOUSID on any failure */ struct rx_connection *tconn; afs_int32 code; char tcell[MAXKTCREAL...
182,628,078,777,332,130,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,095
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
addToGroup(struct rx_call *call, afs_int32 aid, afs_int32 gid, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 tempu; afs_int32 tempg; struct prentry tentry; struct prentry uentry; code = Initdb(); if (code != PRSUCCESS) return code; if (gid == ANYUSERID || gid =...
268,369,621,015,295,400,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,096
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
addWildCards(struct ubik_trans *tt, prlist *alist, afs_uint32 host) { afs_int32 temp; struct prentry tentry; prlist wlist; unsigned wild = htonl(0xffffff00); struct in_addr iaddr; afs_int32 hostid; int size = 0, i, code; int added = 0; char hoststr[16]; while ((host = (host & wi...
65,156,480,765,814,260,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,097
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
dumpEntry(struct rx_call *call, afs_int32 apos, struct prdebugentry *aentry, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTransReadAny(dbase, UBIK_READTRANS, &tt); if (code) return code; code = ubik_SetLo...
274,206,489,702,992,840,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,098
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
getCPS2(struct rx_call *call, afs_int32 aid, afs_uint32 ahost, prlist *alist, afs_int32 *over, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 temp; struct prentry tentry; struct prentry host_tentry; afs_int32 hostid; int host_list = 0; struct in_addr iaddr; char ...
24,584,283,100,847,950,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,099
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
idToName(struct rx_call *call, idlist *aid, namelist *aname) { afs_int32 code; struct ubik_trans *tt; afs_int32 i; int size; int count = 0; /* leave this first for rpc stub */ size = aid->idlist_len; if (size == 0) return 0; if (size < 0 || size > INT_MAX / PR_MAXNAMELEN) return P...
162,360,446,666,247,680,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,100
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
inCPS(prlist CPS, afs_int32 id) { int i; for (i = (CPS.prlist_len - 1); i >= 0; i--) { if (CPS.prlist_val[i] == id) return (1); } return (0); }
36,735,665,873,815,583,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,101
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
listElements(struct rx_call *call, afs_int32 aid, prlist *alist, afs_int32 *over, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 temp; struct prentry tentry; *over = 0; alist->prlist_len = 0; alist->prlist_val = NULL; code = Initdb(); if (code != PRSUCCESS...
168,310,514,155,248,890,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,102
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
listEntry(struct rx_call *call, afs_int32 aid, struct prcheckentry *aentry, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 temp; struct prentry tentry; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTransReadAny(dbase, UBIK_READTRANS, &tt); ...
74,404,138,462,983,410,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,103
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
listMax(struct rx_call *call, afs_int32 *uid, afs_int32 *gid) { afs_int32 code; struct ubik_trans *tt; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTransReadAny(dbase, UBIK_READTRANS, &tt); if (code) return code; code = ubik_SetLock(tt, 1, 1, LOCKREAD); if (co...
252,081,578,545,505,740,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,104
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
listSuperGroups(struct rx_call *call, afs_int32 aid, prlist *alist, afs_int32 *over, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 temp; struct prentry tentry; alist->prlist_len = 0; alist->prlist_val = (afs_int32 *) 0; code = Initdb(); if (code != PRSUCCESS) go...
264,432,784,115,058,620,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,105
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
nameToID(struct rx_call *call, namelist *aname, idlist *aid) { afs_int32 code; struct ubik_trans *tt; afs_int32 i; int size; int count = 0; /* Initialize return struct */ aid->idlist_len = 0; aid->idlist_val = NULL; size = aname->namelist_len; if (size == 0) return 0; if (...
17,360,698,724,984,640,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,106
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
put_prentries(struct prentry *tentry, prentries *bulkentries) { struct prlistentries *entry; if (bulkentries->prentries_val == 0) { bulkentries->prentries_len = 0; bulkentries->prentries_val = (struct prlistentries *)malloc(PR_MAXENTRIES * sizeof(struct prentry)); if (!bulkentries->prentries_va...
271,582,257,323,016,320,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,107
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
removeFromGroup(struct rx_call *call, afs_int32 aid, afs_int32 gid, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 tempu; afs_int32 tempg; struct prentry uentry; struct prentry gentry; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTrans...
171,038,066,268,985,140,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,108
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
setFieldsEntry(struct rx_call *call, afs_int32 id, afs_int32 mask, /* specify which fields to update */ afs_int32 flags, afs_int32 ngroups, afs_int32 nusers, afs_int32 spare1, afs_int32 spare2, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 pos; struct...
25,412,141,227,764,130,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,109
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
setMax(struct rx_call *call, afs_int32 aid, afs_int32 gflag, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTrans(dbase, UBIK_WRITETRANS, &tt); if (code) return code; code = ubik_SetLock(tt, 1, 1, LOCKWRITE); ...
332,278,153,211,693,500,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,110
openafs
396240cf070a806b91fea81131d034e1399af1e0
http://git.openafs.org/?p=openafs
http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0
None
0
whereIsIt(struct rx_call *call, afs_int32 aid, afs_int32 *apos, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; afs_int32 temp; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTransReadAny(dbase, UBIK_READTRANS, &tt); if (code) return code; code = ubik_S...
268,436,392,212,057,530,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-2860
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
https://nvd.nist.gov/vuln/detail/CVE-2016-2860
18,111
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (vpnv4_network, vpnv4_network_cmd, "network A.B.C.D/M rd ASN:nn_or_IP-address:nn tag WORD", "Specify a network to announce via BGP\n" "IP prefix <network>/<length>, e.g., 35.0.0.0/8\n" "Specify Route Distinguisher\n" "VPN Route Distinguisher\n" "BGP tag\n" "...
189,766,218,483,333,140,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,112
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (no_vpnv4_network, no_vpnv4_network_cmd, "no network A.B.C.D/M rd ASN:nn_or_IP-address:nn tag WORD", NO_STR "Specify a network to announce via BGP\n" "IP prefix <network>/<length>, e.g., 35.0.0.0/8\n" "Specify Route Distinguisher\n" "VPN Route Distinguisher\n" ...
249,811,684,323,182,660,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,113
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_all, show_ip_bgp_vpnv4_all_cmd, "show ip bgp vpnv4 all", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display information about all VPNv4 NLRIs\n") { return bgp_show_mpls_vpn (vty, NULL, bgp_show_type_normal, NULL, 0); }...
131,631,893,683,766,600,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,114
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_rd, show_ip_bgp_vpnv4_rd_cmd, "show ip bgp vpnv4 rd ASN:nn_or_IP-address:nn", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display information for a route distinguisher\n" "VPN Route Distinguisher\n") { int ret; ...
329,506,378,781,936,300,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,115
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_all_tags, show_ip_bgp_vpnv4_all_tags_cmd, "show ip bgp vpnv4 all tags", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display information about all VPNv4 NLRIs\n" "Display BGP tags for prefixes\n") { return bgp_sho...
209,465,998,142,133,040,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,116
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_rd_tags, show_ip_bgp_vpnv4_rd_tags_cmd, "show ip bgp vpnv4 rd ASN:nn_or_IP-address:nn tags", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display information for a route distinguisher\n" "VPN Route Distinguisher\n" ...
212,082,359,590,313,720,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,117
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_all_neighbor_routes, show_ip_bgp_vpnv4_all_neighbor_routes_cmd, "show ip bgp vpnv4 all neighbors A.B.C.D routes", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display information about all VPNv4 NLRIs\n" "Detailed i...
241,560,939,809,440,750,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,118
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_rd_neighbor_routes, show_ip_bgp_vpnv4_rd_neighbor_routes_cmd, "show ip bgp vpnv4 rd ASN:nn_or_IP-address:nn neighbors A.B.C.D routes", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display information for a route distinguis...
71,919,358,478,932,970,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,119
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_all_neighbor_advertised_routes, show_ip_bgp_vpnv4_all_neighbor_advertised_routes_cmd, "show ip bgp vpnv4 all neighbors A.B.C.D advertised-routes", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display information about all ...
3,705,101,548,433,158,400,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,120
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
DEFUN (show_ip_bgp_vpnv4_rd_neighbor_advertised_routes, show_ip_bgp_vpnv4_rd_neighbor_advertised_routes_cmd, "show ip bgp vpnv4 rd ASN:nn_or_IP-address:nn neighbors A.B.C.D advertised-routes", SHOW_STR IP_STR BGP_STR "Display VPNv4 NLRI specific information\n" "Display i...
209,047,340,752,756,000,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,121
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
bgp_mplsvpn_init (void) { install_element (BGP_VPNV4_NODE, &vpnv4_network_cmd); install_element (BGP_VPNV4_NODE, &no_vpnv4_network_cmd); install_element (VIEW_NODE, &show_ip_bgp_vpnv4_all_cmd); install_element (VIEW_NODE, &show_ip_bgp_vpnv4_rd_cmd); install_element (VIEW_NODE, &show_ip_bgp_vpnv4_all_tags_cm...
47,762,324,501,491,450,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,122
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
bgp_show_mpls_vpn (struct vty *vty, struct prefix_rd *prd, enum bgp_show_type type, void *output_arg, int tags) { struct bgp *bgp; struct bgp_table *table; struct bgp_node *rn; struct bgp_node *rm; struct bgp_info *ri; int rd_header; int header = 1; char v4_header[] = " Network Next Hop ...
111,985,315,237,696,700,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,123
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
decode_label (u_char *pnt) { u_int32_t l; l = ((u_int32_t) *pnt++ << 12); l |= (u_int32_t) *pnt++ << 4; l |= (u_int32_t) ((*pnt & 0xf0) >> 4); return l; }
30,626,980,220,083,917,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,124
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
decode_rd_as (u_char *pnt, struct rd_as *rd_as) { rd_as->as = (u_int16_t) *pnt++ << 8; rd_as->as |= (u_int16_t) *pnt++; rd_as->val = ((u_int32_t) *pnt++ << 24); rd_as->val |= ((u_int32_t) *pnt++ << 16); rd_as->val |= ((u_int32_t) *pnt++ << 8); rd_as->val |= (u_int32_t) *pnt; }
290,967,410,660,641,870,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,125
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
decode_rd_ip (u_char *pnt, struct rd_ip *rd_ip) { memcpy (&rd_ip->ip, pnt, 4); pnt += 4; rd_ip->val = ((u_int16_t) *pnt++ << 8); rd_ip->val |= (u_int16_t) *pnt; }
165,961,936,856,695,300,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,126
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
decode_rd_type (u_char *pnt) { u_int16_t v; v = ((u_int16_t) *pnt++ << 8); v |= (u_int16_t) *pnt; return v; }
338,371,149,364,517,220,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,127
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
prefix_rd2str (struct prefix_rd *prd, char *buf, size_t size) { u_char *pnt; u_int16_t type; struct rd_as rd_as; struct rd_ip rd_ip; if (size < RD_ADDRSTRLEN) return NULL; pnt = prd->val; type = decode_rd_type (pnt); if (type == RD_TYPE_AS) { decode_rd_as (pnt + 2, &rd_as); snpri...
297,244,315,629,689,500,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,128
savannah
a3bc7e9400b214a0f078fdb19596ba54214a1442
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442
None
0
show_adj_route_vpn (struct vty *vty, struct peer *peer, struct prefix_rd *prd) { struct bgp *bgp; struct bgp_table *table; struct bgp_node *rn; struct bgp_node *rm; struct attr *attr; int rd_header; int header = 1; char v4_header[] = " Network Next Hop Metric LocPrf Weight Path%s";...
24,803,148,603,943,774,000,000,000,000,000,000,000
bgp_mplsvpn.c
142,947,877,026,029,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2342
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (s...
https://nvd.nist.gov/vuln/detail/CVE-2016-2342
18,164
exim
5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
SECURITY: DMARC uses From header untrusted data CVE-2014-2957 To find the sending domain, expand_string() was used to directly parse the contents of the From header. This passes untrusted data directly into an internal function. Convert to use standard internal parsing functions.
0
add_to_eblock(error_block *eblock, uschar *t1, uschar *t2) { error_block *eb = malloc(sizeof(error_block)); if (eblock == NULL) eblock = eb; else { /* Find the end of the eblock struct and point it at eb */ error_block *tmp = eblock; while(tmp->next != NULL) tmp = tmp->next; tmp->next ...
669,103,381,126,803,500,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2957
The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
https://nvd.nist.gov/vuln/detail/CVE-2014-2957
18,165
exim
5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
SECURITY: DMARC uses From header untrusted data CVE-2014-2957 To find the sending domain, expand_string() was used to directly parse the contents of the From header. This passes untrusted data directly into an internal function. Convert to use standard internal parsing functions.
0
int dmarc_init() { int *netmask = NULL; /* Ignored */ int is_ipv6 = 0; char *tld_file = (dmarc_tld_file == NULL) ? "/etc/exim/opendmarc.tlds" : (char *)dmarc_tld_file; /* Set some sane defaults. Also clears previous results when * multiple messages in one connec...
220,713,169,223,047,370,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2957
The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
https://nvd.nist.gov/vuln/detail/CVE-2014-2957
18,166
openssl
1fb9fdc3027b27d8eb6a1e6a846435b070980770
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770
Fix DTLS replay protection The DTLS implementation provides some protection against replay attacks in accordance with RFC6347 section 4.1.2.6. A sliding "window" of valid record sequence numbers is maintained with the "right" hand edge of the window set to the highest sequence number we have received so far. Records ...
0
void DTLS_RECORD_LAYER_clear(RECORD_LAYER *rl) { DTLS_RECORD_LAYER *d; pitem *item = NULL; DTLS1_RECORD_DATA *rdata; pqueue *unprocessed_rcds; pqueue *processed_rcds; pqueue *buffered_app_data; d = rl->d; while ((item = pqueue_pop(d->unprocessed_rcds.q)) != NULL) { rdata = (DTL...
339,668,057,538,877,500,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2016-2181
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record....
https://nvd.nist.gov/vuln/detail/CVE-2016-2181
18,167
openssl
1fb9fdc3027b27d8eb6a1e6a846435b070980770
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770
Fix DTLS replay protection The DTLS implementation provides some protection against replay attacks in accordance with RFC6347 section 4.1.2.6. A sliding "window" of valid record sequence numbers is maintained with the "right" hand edge of the window set to the highest sequence number we have received so far. Records ...
0
void DTLS_RECORD_LAYER_free(RECORD_LAYER *rl) { DTLS_RECORD_LAYER_clear(rl); pqueue_free(rl->d->unprocessed_rcds.q); pqueue_free(rl->d->processed_rcds.q); pqueue_free(rl->d->buffered_app_data.q); OPENSSL_free(rl->d); rl->d = NULL; }
228,264,207,076,211,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2016-2181
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record....
https://nvd.nist.gov/vuln/detail/CVE-2016-2181