idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
18,168 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int DTLS_RECORD_LAYER_new(RECORD_LAYER *rl)
{
DTLS_RECORD_LAYER *d;
if ((d = OPENSSL_malloc(sizeof(*d))) == NULL)
return (0);
rl->d = d;
d->unprocessed_rcds.q = pqueue_new();
d->processed_rcds.q = pqueue_new();
d->buffered_app_data.q = pqueue_new();
if (d->unprocessed_rcds.q == N... | 211,295,443,174,519,800,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,169 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | void DTLS_RECORD_LAYER_set_saved_w_epoch(RECORD_LAYER *rl, unsigned short e)
{
if (e == rl->d->w_epoch - 1) {
memcpy(rl->d->curr_write_sequence,
rl->write_sequence, sizeof(rl->write_sequence));
memcpy(rl->write_sequence,
rl->d->last_write_sequence, sizeof(rl->write_sequ... | 88,291,037,244,319,320,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,170 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | void DTLS_RECORD_LAYER_set_write_sequence(RECORD_LAYER *rl, unsigned char *seq)
{
memcpy(rl->write_sequence, seq, SEQ_NUM_SIZE);
}
| 260,216,880,745,415,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,171 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int dtls1_buffer_record(SSL *s, record_pqueue *queue, unsigned char *priority)
{
DTLS1_RECORD_DATA *rdata;
pitem *item;
/* Limit the size of the queue to prevent DOS attacks */
if (pqueue_size(queue->q) >= 100)
return 0;
rdata = OPENSSL_malloc(sizeof(*rdata));
item = pitem_new(priority... | 11,894,481,611,008,283,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,172 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | static int dtls1_copy_record(SSL *s, pitem *item)
{
DTLS1_RECORD_DATA *rdata;
rdata = (DTLS1_RECORD_DATA *)item->data;
SSL3_BUFFER_release(&s->rlayer.rbuf);
s->rlayer.packet = rdata->packet;
s->rlayer.packet_length = rdata->packet_length;
memcpy(&s->rlayer.rbuf, &(rdata->rbuf), sizeof(SSL3_BU... | 24,838,039,840,532,567,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,173 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int dtls1_retrieve_buffered_record(SSL *s, record_pqueue *queue)
{
pitem *item;
item = pqueue_pop(queue->q);
if (item) {
dtls1_copy_record(s, item);
OPENSSL_free(item->data);
pitem_free(item);
return (1);
}
return (0);
}
| 22,322,147,418,816,447,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,174 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | void SSL3_RECORD_clear(SSL3_RECORD *r, unsigned int num_recs)
{
unsigned char *comp;
unsigned int i;
for (i = 0; i < num_recs; i++) {
comp = r[i].comp;
memset(&r[i], 0, sizeof(*r));
r[i].comp = comp;
}
}
| 327,288,069,520,961,430,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,175 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | void SSL3_RECORD_release(SSL3_RECORD *r, unsigned int num_recs)
{
unsigned int i;
for (i = 0; i < num_recs; i++) {
OPENSSL_free(r[i].comp);
r[i].comp = NULL;
}
}
| 101,789,835,978,568,940,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,176 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int n_ssl3_mac(SSL *ssl, SSL3_RECORD *rec, unsigned char *md, int send)
{
unsigned char *mac_sec, *seq;
const EVP_MD_CTX *hash;
unsigned char *p, rec_char;
size_t md_size;
int npad;
int t;
if (send) {
mac_sec = &(ssl->s3->write_mac_secret[0]);
seq = RECORD_LAYER_get_write_se... | 225,589,119,570,824,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,177 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | void ssl3_cbc_copy_mac(unsigned char *out,
const SSL3_RECORD *rec, unsigned md_size)
{
#if defined(CBC_MAC_ROTATE_IN_PLACE)
unsigned char rotated_mac_buf[64 + EVP_MAX_MD_SIZE];
unsigned char *rotated_mac;
#else
unsigned char rotated_mac[EVP_MAX_MD_SIZE];
#endif
/*
* mac_end ... | 80,146,600,404,364,920,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,178 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int ssl3_cbc_remove_padding(SSL3_RECORD *rec,
unsigned block_size, unsigned mac_size)
{
unsigned padding_length, good;
const unsigned overhead = 1 /* padding length byte */ + mac_size;
/*
* These lengths are all public so we can test them in non-constant time.
*/
... | 249,760,988,911,709,720,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,179 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int ssl3_do_compress(SSL *ssl, SSL3_RECORD *wr)
{
#ifndef OPENSSL_NO_COMP
int i;
i = COMP_compress_block(ssl->compress, wr->data,
SSL3_RT_MAX_COMPRESSED_LENGTH,
wr->input, (int)wr->length);
if (i < 0)
return (0);
else
wr->length = ... | 249,649,403,951,164,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,180 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, unsigned int n_recs, int send)
{
SSL3_RECORD *rec;
EVP_CIPHER_CTX *ds;
unsigned long l;
int bs, i, mac_size = 0;
const EVP_CIPHER *enc;
rec = inrecs;
/*
* We shouldn't ever be called with more than one record in the SSLv3 case
*/
if (n... | 266,178,231,657,216,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,181 | openssl | 1fb9fdc3027b27d8eb6a1e6a846435b070980770 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 | Fix DTLS replay protection
The DTLS implementation provides some protection against replay attacks
in accordance with RFC6347 section 4.1.2.6.
A sliding "window" of valid record sequence numbers is maintained with
the "right" hand edge of the window set to the highest sequence number we
have received so far. Records ... | 0 | int tls1_cbc_remove_padding(const SSL *s,
SSL3_RECORD *rec,
unsigned block_size, unsigned mac_size)
{
unsigned padding_length, good, to_check, i;
const unsigned overhead = 1 /* padding length byte */ + mac_size;
/* Check if version requires explicit I... | 117,147,724,276,743,510,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2181 | The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.... | https://nvd.nist.gov/vuln/detail/CVE-2016-2181 |
18,281 | samba | 0dedfbce2c1b851684ba658861fe9d620636c56a | https://github.com/samba-team/samba | https://git.samba.org/?p=rsync.git;a=commit;h=0dedfbce2c1b851684ba658861fe9d620636c56a | None | 0 | static void gen_challenge(const char *addr, char *challenge)
{
char input[32];
char digest[MAX_DIGEST_LEN];
struct timeval tv;
int len;
memset(input, 0, sizeof input);
strlcpy(input, addr, 17);
sys_gettimeofday(&tv);
SIVAL(input, 16, tv.tv_sec);
SIVAL(input, 20, tv.tv_usec);
SIVAL(input, 24, getpid());
su... | 83,542,058,620,019,760,000,000,000,000,000,000,000 | authenticate.c | 194,409,675,219,820,950,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-2855 | The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2855 |
18,282 | samba | 0dedfbce2c1b851684ba658861fe9d620636c56a | https://github.com/samba-team/samba | https://git.samba.org/?p=rsync.git;a=commit;h=0dedfbce2c1b851684ba658861fe9d620636c56a | None | 0 | static void generate_hash(const char *in, const char *challenge, char *out)
{
char buf[MAX_DIGEST_LEN];
int len;
sum_init(0);
sum_update(in, strlen(in));
sum_update(challenge, strlen(challenge));
len = sum_end(buf);
base64_encode(buf, len, out, 0);
}
| 157,960,576,796,526,270,000,000,000,000,000,000,000 | authenticate.c | 194,409,675,219,820,950,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-2855 | The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2855 |
18,321 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
{
if ((in == NULL) || (in->cipher == NULL)) {
EVPerr(EVP_F_EVP_CIPHER_CTX_COPY, EVP_R_INPUT_NOT_INITIALIZED);
return 0;
}
#ifndef OPENSSL_NO_ENGINE
/* Make sure it's safe to copy a cipher context using an ENGINE */
if... | 161,594,747,217,496,350,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,322 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
{
EVP_CIPHER_CTX_reset(ctx);
OPENSSL_free(ctx);
}
| 39,160,718,995,260,594,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,323 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key)
{
if (ctx->cipher->flags & EVP_CIPH_RAND_KEY)
return EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_RAND_KEY, 0, key);
if (RAND_bytes(key, ctx->key_len) <= 0)
return 0;
return 1;
}
| 269,109,176,506,365,870,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,324 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CIPHER_CTX_reset(EVP_CIPHER_CTX *c)
{
if (c == NULL)
return 1;
if (c->cipher != NULL) {
if (c->cipher->cleanup && !c->cipher->cleanup(c))
return 0;
/* Cleanse cipher context data */
if (c->cipher_data && c->cipher->ctx_size)
OPENSSL_cleanse(c->ciph... | 278,732,972,814,016,670,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,325 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen)
{
if (c->cipher->flags & EVP_CIPH_CUSTOM_KEY_LENGTH)
return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL);
if (c->key_len == keylen)
return 1;
if ((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) {... | 194,398,599,599,127,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,326 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad)
{
if (pad)
ctx->flags &= ~EVP_CIPH_NO_PADDING;
else
ctx->flags |= EVP_CIPH_NO_PADDING;
return 1;
}
| 334,770,951,617,182,260,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,327 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
{
if (ctx->encrypt)
return EVP_EncryptFinal(ctx, out, outl);
else
return EVP_DecryptFinal(ctx, out, outl);
}
| 42,449,626,918,222,015,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,328 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
const unsigned char *key, const unsigned char *iv, int enc)
{
EVP_CIPHER_CTX_reset(ctx);
return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
}
| 162,168,121,708,845,580,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,329 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
ENGINE *impl, const unsigned char *key,
const unsigned char *iv, int enc)
{
if (enc == -1)
enc = ctx->encrypt;
else {
if (enc)
enc = 1;
ctx->encrypt = enc;
}
#... | 68,243,095,652,019,470,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,330 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
const unsigned char *in, int inl)
{
if (ctx->encrypt)
return EVP_EncryptUpdate(ctx, out, outl, in, inl);
else
return EVP_DecryptUpdate(ctx, out, outl, in, inl);
}
| 207,864,415,233,399,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,331 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
{
int ret;
ret = EVP_DecryptFinal_ex(ctx, out, outl);
return ret;
}
| 43,586,636,485,766,150,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,332 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
{
int i, n;
unsigned int b;
*outl = 0;
if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
i = ctx->cipher->do_cipher(ctx, out, NULL, 0);
if (i < 0)
return 0;
else
*outl = i;
... | 43,428,858,977,616,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,333 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
const unsigned char *key, const unsigned char *iv)
{
return EVP_CipherInit(ctx, cipher, key, iv, 0);
}
| 275,521,601,865,973,880,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,334 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
ENGINE *impl, const unsigned char *key,
const unsigned char *iv)
{
return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 0);
}
| 115,728,875,298,818,950,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,335 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
const unsigned char *in, int inl)
{
int fix_len;
unsigned int b;
if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
fix_len = ctx->cipher->do_cipher(ctx, out, in, inl);
if (fix_len < 0) {
... | 322,017,278,526,344,230,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,336 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
{
int ret;
ret = EVP_EncryptFinal_ex(ctx, out, outl);
return ret;
}
| 146,854,971,187,083,320,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,337 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
{
int n, ret;
unsigned int i, b, bl;
if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
ret = ctx->cipher->do_cipher(ctx, out, NULL, 0);
if (ret < 0)
return 0;
else
*outl = ret;
... | 89,782,611,918,197,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,338 | openssl | 3f3582139fbb259a1c3cbb0a25236500a409bf26 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 | Fix encrypt overflow
An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate with a partial block then a length check can overflow
resulting in a heap corruption.
Following an analysis of all OpenSSL internal... | 0 | int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
const unsigned char *key, const unsigned char *iv)
{
return EVP_CipherInit(ctx, cipher, key, iv, 1);
}
| 335,832,273,023,377,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2106 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2106 |
18,339 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl)
{
int i;
*outl = 0;
if (ctx->num != 0) {
i = EVP_DecodeBlock(out, ctx->enc_data, ctx->num);
if (i < 0)
return (-1);
ctx->num = 0;
*outl = i;
return (1);
} else
return (1);... | 249,168,600,529,391,240,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,340 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | void EVP_DecodeInit(EVP_ENCODE_CTX *ctx)
{
/* Only ctx->num is used during decoding. */
ctx->num = 0;
ctx->length = 0;
ctx->line_num = 0;
ctx->expect_nl = 0;
}
| 235,384,285,718,830,500,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,341 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
const unsigned char *in, int inl)
{
int seof = 0, eof = 0, rv = -1, ret = 0, i, v, tmp, n, decoded_len;
unsigned char *d;
n = ctx->num;
d = ctx->enc_data;
if (n > 0 && d[n - 1] == '=') {
eof++;
... | 15,060,584,390,599,385,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,342 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | int EVP_DecodeValid(unsigned char *buf, int len)
{
int i, num = 0, bad = 0;
if (len == 0)
return (-1);
while (conv_ascii2bin(*buf) == B64_WS) {
buf++;
len--;
if (len == 0)
return (-1);
}
for (i = len; i >= 4; i -= 4) {
if ((conv_ascii2bin(buf[0])... | 83,458,755,332,346,880,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,343 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int dlen)
{
int i, ret = 0;
unsigned long l;
for (i = dlen; i > 0; i -= 3) {
if (i >= 3) {
l = (((unsigned long)f[0]) << 16L) |
(((unsigned long)f[1]) << 8L) | f[2];
*(t++) = conv_bin2ascii(l >> 18... | 241,658,482,111,087,140,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,344 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl)
{
unsigned int ret = 0;
if (ctx->num != 0) {
ret = EVP_EncodeBlock(out, ctx->enc_data, ctx->num);
out[ret++] = '\n';
out[ret] = '\0';
ctx->num = 0;
}
*outl = ret;
}
| 228,893,710,891,640,240,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,345 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | void EVP_EncodeInit(EVP_ENCODE_CTX *ctx)
{
ctx->length = 48;
ctx->num = 0;
ctx->line_num = 0;
}
| 276,017,593,436,084,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,346 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | static unsigned char conv_ascii2bin(unsigned char a)
{
if (a & 0x80)
return B64_ERROR;
return data_ascii2bin[a];
}
| 188,021,436,100,628,360,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,347 | openssl | 5b814481f3573fa9677f3a31ee51322e2a22ee6a | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a | Avoid overflow in EVP_EncodeUpdate
An overflow can occur in the EVP_EncodeUpdate function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption. Due to the very large amounts of data involved t... | 0 | static unsigned char conv_ascii2bin(unsigned char a)
{
a = os_toascii[a];
if (a & 0x80)
return B64_ERROR;
return data_ascii2bin[a];
}
| 131,544,655,225,565,050,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2105 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. | https://nvd.nist.gov/vuln/detail/CVE-2016-2105 |
18,348 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static struct nl_msg *__nlmsg_alloc(size_t len)
{
struct nl_msg *nm;
if (len < sizeof(struct nlmsghdr))
len = sizeof(struct nlmsghdr);
nm = calloc(1, sizeof(*nm));
if (!nm)
goto errout;
nm->nm_refcnt = 1;
nm->nm_nlh = calloc(1, len);
if (!nm->nm_nlh)
goto errout;
nm->nm_protocol = -1;
nm->nm_size = ... | 17,129,033,842,656,988,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,349 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void dump_attr(FILE *ofd, struct nlattr *attr, int prefix)
{
int len = nla_len(attr);
dump_hex(ofd, nla_data(attr), len, prefix);
}
| 78,208,728,863,315,790,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,350 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void dump_attrs(FILE *ofd, struct nlattr *attrs, int attrlen,
int prefix)
{
int rem;
struct nlattr *nla;
nla_for_each_attr(nla, attrs, attrlen, rem) {
int padlen, alen = nla_len(nla);
prefix_line(ofd, prefix);
if (nla->nla_type == 0)
fprintf(ofd, " [ATTR PADDING] %d octets\n", alen);
e... | 106,752,217,250,646,840,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,351 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void dump_error_msg(struct nl_msg *msg, FILE *ofd)
{
struct nlmsghdr *hdr = nlmsg_hdr(msg);
struct nlmsgerr *err = nlmsg_data(hdr);
fprintf(ofd, " [ERRORMSG] %zu octets\n", sizeof(*err));
if (nlmsg_len(hdr) >= sizeof(*err)) {
struct nl_msg *errmsg;
fprintf(ofd, " .error = %d \"%s\"\n", err->error,... | 30,848,254,889,717,640,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,352 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static inline void dump_hex(FILE *ofd, char *start, int len, int prefix)
{
int i, a, c, limit;
char ascii[21] = {0};
limit = 16 - (prefix * 2);
prefix_line(ofd, prefix);
fprintf(ofd, " ");
for (i = 0, a = 0, c = 0; i < len; i++) {
int v = *(uint8_t *) (start + i);
fprintf(ofd, "%02x ", v);
ascii[a++] ... | 81,111,686,122,790,270,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,353 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void nl_msg_dump(struct nl_msg *msg, FILE *ofd)
{
struct nlmsghdr *hdr = nlmsg_hdr(msg);
fprintf(ofd,
"-------------------------- BEGIN NETLINK MESSAGE ---------------------------\n");
fprintf(ofd, " [NETLINK HEADER] %zu octets\n", sizeof(struct nlmsghdr));
print_hdr(ofd, msg);
if (hdr->nlmsg_type == NLMS... | 19,617,591,787,680,325,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,354 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nl_msg_parse(struct nl_msg *msg, void (*cb)(struct nl_object *, void *),
void *arg)
{
struct nl_cache_ops *ops;
struct nl_parser_param p = {
.pp_cb = parse_cb
};
struct dp_xdata x = {
.cb = cb,
.arg = arg,
};
int err;
ops = nl_cache_ops_associate_safe(nlmsg_get_proto(msg),
nlmsg_hdr(msg)->nl... | 312,612,209,070,458,370,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,355 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | char *nl_nlmsg_flags2str(int flags, char *buf, size_t len)
{
memset(buf, 0, len);
#define PRINT_FLAG(f) \
if (flags & NLM_F_##f) { \
flags &= ~NLM_F_##f; \
strncat(buf, #f, len - strlen(buf) - 1); \
if (flags) \
strncat(buf, ",", len - strlen(buf) - 1); \
}
PRINT_FLAG(REQUEST);
PRINT_FLAG(MULTI);
PRIN... | 338,649,069,664,580,100,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,356 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | char *nl_nlmsgtype2str(int type, char *buf, size_t size)
{
return __type2str(type, buf, size, nl_msgtypes,
ARRAY_SIZE(nl_msgtypes));
}
| 97,973,775,967,229,030,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,357 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nl_str2nlmsgtype(const char *name)
{
return __str2type(name, nl_msgtypes, ARRAY_SIZE(nl_msgtypes));
}
| 155,868,710,739,323,800,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,358 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nl_msg *nlmsg_alloc(void)
{
return __nlmsg_alloc(default_msg_size);
}
| 78,550,533,200,397,270,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,359 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nl_msg *nlmsg_alloc_simple(int nlmsgtype, int flags)
{
struct nl_msg *msg;
struct nlmsghdr nlh = {
.nlmsg_type = nlmsgtype,
.nlmsg_flags = flags,
};
msg = nlmsg_inherit(&nlh);
if (msg)
NL_DBG(2, "msg %p: Allocated new simple message\n", msg);
return msg;
}
| 21,292,228,541,418,055,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,360 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nl_msg *nlmsg_alloc_size(size_t max)
{
return __nlmsg_alloc(max);
}
| 317,356,018,994,785,020,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,361 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_append(struct nl_msg *n, void *data, size_t len, int pad)
{
void *tmp;
tmp = nlmsg_reserve(n, len, pad);
if (tmp == NULL)
return -NLE_NOMEM;
memcpy(tmp, data, len);
NL_DBG(2, "msg %p: Appended %zu bytes with padding %d\n", n, len, pad);
return 0;
}
| 7,836,657,985,723,057,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,362 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nlattr *nlmsg_attrdata(const struct nlmsghdr *nlh, int hdrlen)
{
unsigned char *data = nlmsg_data(nlh);
return (struct nlattr *) (data + NLMSG_ALIGN(hdrlen));
}
| 136,164,380,191,192,900,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,363 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nl_msg *nlmsg_convert(struct nlmsghdr *hdr)
{
struct nl_msg *nm;
nm = __nlmsg_alloc(NLMSG_ALIGN(hdr->nlmsg_len));
if (!nm)
return NULL;
memcpy(nm->nm_nlh, hdr, hdr->nlmsg_len);
return nm;
}
| 105,395,753,329,102,700,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,364 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void *nlmsg_data(const struct nlmsghdr *nlh)
{
return (unsigned char *) nlh + NLMSG_HDRLEN;
}
| 195,210,041,589,283,420,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,365 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_datalen(const struct nlmsghdr *nlh)
{
return nlh->nlmsg_len - NLMSG_HDRLEN;
}
| 234,922,768,195,598,700,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,366 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_expand(struct nl_msg *n, size_t newlen)
{
void *tmp;
if (newlen <= n->nm_size)
return -NLE_INVAL;
tmp = realloc(n->nm_nlh, newlen);
if (tmp == NULL)
return -NLE_NOMEM;
n->nm_nlh = tmp;
n->nm_size = newlen;
return 0;
}
| 26,091,760,954,559,570,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,367 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nlattr *nlmsg_find_attr(struct nlmsghdr *nlh, int hdrlen, int attrtype)
{
return nla_find(nlmsg_attrdata(nlh, hdrlen),
nlmsg_attrlen(nlh, hdrlen), attrtype);
}
| 207,332,569,578,695,450,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,368 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void nlmsg_free(struct nl_msg *msg)
{
if (!msg)
return;
msg->nm_refcnt--;
NL_DBG(4, "Returned message reference %p, %d remaining\n",
msg, msg->nm_refcnt);
if (msg->nm_refcnt < 0)
BUG();
if (msg->nm_refcnt <= 0) {
free(msg->nm_nlh);
NL_DBG(2, "msg %p: Freed\n", msg);
free(msg);
}
}
| 133,374,655,851,982,560,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,369 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void nlmsg_get(struct nl_msg *msg)
{
msg->nm_refcnt++;
NL_DBG(4, "New reference to message %p, total %d\n",
msg, msg->nm_refcnt);
}
| 234,757,330,248,501,530,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,370 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct sockaddr_nl *nlmsg_get_dst(struct nl_msg *msg)
{
return &msg->nm_dst;
}
| 249,962,529,992,305,700,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,371 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | size_t nlmsg_get_max_size(struct nl_msg *msg)
{
return msg->nm_size;
}
| 293,545,780,930,857,800,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,372 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_get_proto(struct nl_msg *msg)
{
return msg->nm_protocol;
}
| 276,182,795,611,118,330,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,373 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct sockaddr_nl *nlmsg_get_src(struct nl_msg *msg)
{
return &msg->nm_src;
}
| 319,437,719,697,144,460,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,374 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nlmsghdr *nlmsg_hdr(struct nl_msg *n)
{
return n->nm_nlh;
}
| 8,569,376,130,019,525,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,375 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static int nlmsg_len(const struct nlmsghdr *nlh)
{
return nlmsg_datalen(nlh);
}
| 62,593,801,554,002,070,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,376 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nlmsghdr *nlmsg_next(struct nlmsghdr *nlh, int *remaining)
{
int totlen = NLMSG_ALIGN(nlh->nlmsg_len);
*remaining -= totlen;
return (struct nlmsghdr *) ((unsigned char *) nlh + totlen);
}
| 274,276,672,874,636,060,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,377 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_ok(const struct nlmsghdr *nlh, int remaining)
{
return (remaining >= (int)sizeof(struct nlmsghdr) &&
nlh->nlmsg_len >= sizeof(struct nlmsghdr) &&
nlh->nlmsg_len <= remaining);
}
| 91,644,166,571,914,460,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,378 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_padlen(int payload)
{
return nlmsg_total_size(payload) - nlmsg_msg_size(payload);
}
| 227,883,991,747,121,230,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,379 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_parse(struct nlmsghdr *nlh, int hdrlen, struct nlattr *tb[],
int maxtype, struct nla_policy *policy)
{
if (!nlmsg_valid_hdr(nlh, hdrlen))
return -NLE_MSG_TOOSHORT;
return nla_parse(tb, maxtype, nlmsg_attrdata(nlh, hdrlen),
nlmsg_attrlen(nlh, hdrlen), policy);
}
| 139,981,436,685,627,920,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,380 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | struct nlmsghdr *nlmsg_put(struct nl_msg *n, uint32_t pid, uint32_t seq,
int type, int payload, int flags)
{
struct nlmsghdr *nlh;
if (n->nm_nlh->nlmsg_len < NLMSG_HDRLEN)
BUG();
nlh = (struct nlmsghdr *) n->nm_nlh;
nlh->nlmsg_type = type;
nlh->nlmsg_flags = flags;
nlh->nlmsg_pid = pid;
nlh->nlmsg_seq ... | 11,525,678,709,117,604,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,381 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void nlmsg_set_default_size(size_t max)
{
if (max < nlmsg_total_size(0))
max = nlmsg_total_size(0);
default_msg_size = max;
}
| 35,689,699,313,740,460,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,382 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void nlmsg_set_dst(struct nl_msg *msg, struct sockaddr_nl *addr)
{
memcpy(&msg->nm_dst, addr, sizeof(*addr));
}
| 24,500,634,355,036,965,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,383 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void nlmsg_set_proto(struct nl_msg *msg, int protocol)
{
msg->nm_protocol = protocol;
}
| 226,184,142,483,218,540,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,384 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_size(int payload)
{
return NLMSG_HDRLEN + payload;
}
| 62,205,412,366,244,060,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,385 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | void *nlmsg_tail(const struct nlmsghdr *nlh)
{
return (unsigned char *) nlh + NLMSG_ALIGN(nlh->nlmsg_len);
}
| 314,736,007,635,731,660,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,386 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_total_size(int payload)
{
return NLMSG_ALIGN(nlmsg_msg_size(payload));
}
| 86,455,541,935,681,640,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,387 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_valid_hdr(const struct nlmsghdr *nlh, int hdrlen)
{
if (nlh->nlmsg_len < nlmsg_msg_size(hdrlen))
return 0;
return 1;
}
| 91,814,467,765,646,000,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,388 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | int nlmsg_validate(struct nlmsghdr *nlh, int hdrlen, int maxtype,
struct nla_policy *policy)
{
if (!nlmsg_valid_hdr(nlh, hdrlen))
return -NLE_MSG_TOOSHORT;
return nla_validate(nlmsg_attrdata(nlh, hdrlen),
nlmsg_attrlen(nlh, hdrlen), maxtype, policy);
}
| 167,594,042,800,143,200,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,389 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static int parse_cb(struct nl_object *obj, struct nl_parser_param *p)
{
struct dp_xdata *x = p->pp_arg;
x->cb(obj, x->arg);
return 0;
}
| 298,094,037,007,918,970,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,390 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void prefix_line(FILE *ofd, int prefix)
{
int i;
for (i = 0; i < prefix; i++)
fprintf(ofd, " ");
}
| 204,340,831,601,980,200,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,391 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void print_genl_hdr(FILE *ofd, void *start)
{
struct genlmsghdr *ghdr = start;
fprintf(ofd, " [GENERIC NETLINK HEADER] %zu octets\n", GENL_HDRLEN);
fprintf(ofd, " .cmd = %u\n", ghdr->cmd);
fprintf(ofd, " .version = %u\n", ghdr->version);
fprintf(ofd, " .unused = %#x\n", ghdr->reserved);
}
| 60,430,533,224,711,280,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,392 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void *print_genl_msg(struct nl_msg *msg, FILE *ofd, struct nlmsghdr *hdr,
struct nl_cache_ops *ops, int *payloadlen)
{
void *data = nlmsg_data(hdr);
if (*payloadlen < GENL_HDRLEN)
return data;
print_genl_hdr(ofd, data);
*payloadlen -= GENL_HDRLEN;
data += GENL_HDRLEN;
if (ops) {
int hdrsize ... | 249,748,364,520,306,100,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,393 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void print_hdr(FILE *ofd, struct nl_msg *msg)
{
struct nlmsghdr *nlh = nlmsg_hdr(msg);
struct nl_cache_ops *ops;
struct nl_msgtype *mt;
char buf[128];
fprintf(ofd, " .nlmsg_len = %d\n", nlh->nlmsg_len);
ops = nl_cache_ops_associate_safe(nlmsg_get_proto(msg), nlh->nlmsg_type);
if (ops) {
mt = nl_msg... | 47,010,606,103,607,170,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,394 | infradead | 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | http://git.infradead.org/?p=mtd-2.6 | http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb | None | 0 | static void print_msg(struct nl_msg *msg, FILE *ofd, struct nlmsghdr *hdr)
{
struct nl_cache_ops *ops;
int payloadlen = nlmsg_len(hdr);
int attrlen = 0;
void *data;
data = nlmsg_data(hdr);
ops = nl_cache_ops_associate_safe(nlmsg_get_proto(msg),
hdr->nlmsg_type);
if (ops) {
attrlen = nlmsg_attrlen(hdr, ... | 164,747,131,419,000,900,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-0553 | An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android... | https://nvd.nist.gov/vuln/detail/CVE-2017-0553 |
18,395 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | kex_from_blob(struct sshbuf *m, struct kex **kexp)
{
struct kex *kex;
int r;
if ((kex = calloc(1, sizeof(struct kex))) == NULL ||
(kex->my = sshbuf_new()) == NULL ||
(kex->peer = sshbuf_new()) == NULL) {
r = SSH_ERR_ALLOC_FAIL;
goto out;
}
if ((r = sshbuf_get_string(m, &kex->session_id, &kex->sessio... | 119,595,521,894,804,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,396 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | kex_to_blob(struct sshbuf *m, struct kex *kex)
{
int r;
if ((r = sshbuf_put_string(m, kex->session_id,
kex->session_id_len)) != 0 ||
(r = sshbuf_put_u32(m, kex->we_need)) != 0 ||
(r = sshbuf_put_u32(m, kex->hostkey_type)) != 0 ||
(r = sshbuf_put_u32(m, kex->kex_type)) != 0 ||
(r = sshbuf_put... | 304,171,112,791,631,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,397 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | newkeys_from_blob(struct sshbuf *m, struct ssh *ssh, int mode)
{
struct sshbuf *b = NULL;
struct sshcomp *comp;
struct sshenc *enc;
struct sshmac *mac;
struct newkeys *newkey = NULL;
size_t keylen, ivlen, maclen;
int r;
if ((newkey = calloc(1, sizeof(*newkey))) == NULL) {
r = SSH_ERR_ALLOC_FAIL;
goto out;
... | 289,170,269,977,145,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,398 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | ssh_alloc_session_state(void)
{
struct ssh *ssh = NULL;
struct session_state *state = NULL;
if ((ssh = calloc(1, sizeof(*ssh))) == NULL ||
(state = calloc(1, sizeof(*state))) == NULL ||
(state->input = sshbuf_new()) == NULL ||
(state->output = sshbuf_new()) == NULL ||
(state->outgoing_packet = s... | 38,095,036,229,186,348,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,399 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | ssh_packet_backup_state(struct ssh *ssh,
struct ssh *backup_state)
{
struct ssh *tmp;
close(ssh->state->connection_in);
ssh->state->connection_in = -1;
close(ssh->state->connection_out);
ssh->state->connection_out = -1;
if (backup_state)
tmp = backup_state;
else
tmp = ssh_alloc_session_state();
backup_... | 295,871,285,184,539,680,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,400 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | ssh_packet_close(struct ssh *ssh)
{
struct session_state *state = ssh->state;
int r;
u_int mode;
if (!state->initialized)
return;
state->initialized = 0;
if (state->connection_in == state->connection_out) {
shutdown(state->connection_out, SHUT_RDWR);
close(state->connection_out);
} else {
close(state->c... | 325,742,352,902,730,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,401 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | ssh_packet_connection_af(struct ssh *ssh)
{
struct sockaddr_storage to;
socklen_t tolen = sizeof(to);
memset(&to, 0, sizeof(to));
if (getsockname(ssh->state->connection_out, (struct sockaddr *)&to,
&tolen) < 0)
return 0;
#ifdef IPV4_IN_IPV6
if (to.ss_family == AF_INET6 &&
IN6_IS_ADDR_V4MAPPED(&((struc... | 136,272,429,400,422,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,402 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | ssh_packet_connection_is_on_socket(struct ssh *ssh)
{
struct session_state *state = ssh->state;
struct sockaddr_storage from, to;
socklen_t fromlen, tolen;
/* filedescriptors in and out are the same, so it's a socket */
if (state->connection_in == state->connection_out)
return 1;
fromlen = sizeof(from);
memse... | 98,646,411,049,581,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,403 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | ssh_packet_disconnect(struct ssh *ssh, const char *fmt,...)
{
char buf[1024];
va_list args;
static int disconnecting = 0;
int r;
if (disconnecting) /* Guard against recursive invocations. */
fatal("packet_disconnect called recursively.");
disconnecting = 1;
/*
* Format the message. Note that the caller mu... | 170,648,758,759,651,880,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
18,404 | mindrot | 2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 | None | 0 | ssh_packet_enable_delayed_compress(struct ssh *ssh)
{
struct session_state *state = ssh->state;
struct sshcomp *comp = NULL;
int r, mode;
/*
* Remember that we are past the authentication step, so rekeying
* with COMP_DELAYED will turn on compression immediately.
*/
state->after_authentication = 1;
for (mo... | 87,894,610,851,866,170,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1907 | The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. | https://nvd.nist.gov/vuln/detail/CVE-2016-1907 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.