idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
18,405
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_bytes(struct ssh *ssh, u_int64_t *ibytes, u_int64_t *obytes) { if (ibytes) *ibytes = ssh->state->p_read.bytes; if (obytes) *obytes = ssh->state->p_send.bytes; }
245,393,888,572,107,330,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,406
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_connection_in(struct ssh *ssh) { return ssh->state->connection_in; }
273,987,756,920,895,330,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,407
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_connection_out(struct ssh *ssh) { return ssh->state->connection_out; }
17,902,016,427,866,085,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,408
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_input(struct ssh *ssh) { return (void *)ssh->state->input; }
206,375,544,948,117,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,409
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_maxsize(struct ssh *ssh) { return ssh->state->max_packet_size; }
196,079,693,159,194,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,410
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_output(struct ssh *ssh) { return (void *)ssh->state->output; }
261,212,618,159,041,380,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,411
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_protocol_flags(struct ssh *ssh) { return ssh->state->remote_protocol_flags; }
256,946,959,872,098,840,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,412
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_get_rekey_timeout(struct ssh *ssh) { time_t seconds; seconds = ssh->state->rekey_time + ssh->state->rekey_interval - monotime(); return (seconds <= 0 ? 1 : seconds); }
304,994,172,796,265,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,413
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_have_data_to_write(struct ssh *ssh) { return sshbuf_len(ssh->state->output) != 0; }
36,660,700,998,137,905,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,414
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_inc_alive_timeouts(struct ssh *ssh) { return ++ssh->state->keep_alive_timeouts; }
260,932,001,550,687,720,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,415
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_init_compression(struct ssh *ssh) { if (!ssh->state->compression_buffer && ((ssh->state->compression_buffer = sshbuf_new()) == NULL)) return SSH_ERR_ALLOC_FAIL; return 0; }
279,229,844,763,255,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,416
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_is_interactive(struct ssh *ssh) { return ssh->state->interactive_mode; }
328,189,647,788,548,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,417
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_need_rekeying(struct ssh *ssh) { struct session_state *state = ssh->state; if (ssh->compat & SSH_BUG_NOREKEY) return 0; return (state->p_send.packets > MAX_PACKETS) || (state->p_read.packets > MAX_PACKETS) || (state->max_blocks_out && (state->p_send.blocks > state->max_blocks_ou...
77,580,842,961,236,940,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,418
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_process_incoming(struct ssh *ssh, const char *buf, u_int len) { struct session_state *state = ssh->state; int r; if (state->packet_discard) { state->keep_alive_timeouts = 0; /* ?? */ if (len >= state->packet_discard) { if ((r = ssh_packet_stop_discard(ssh)) != 0) return r; } state->packet_...
159,829,541,037,349,630,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,419
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_read(struct ssh *ssh) { u_char type; int r; if ((r = ssh_packet_read_seqnr(ssh, &type, NULL)) != 0) fatal("%s: %s", __func__, ssh_err(r)); return type; }
1,025,662,881,742,557,500,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,420
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_read_expect(struct ssh *ssh, u_int expected_type) { int r; u_char type; if ((r = ssh_packet_read_seqnr(ssh, &type, NULL)) != 0) return r; if (type != expected_type) { if ((r = sshpkt_disconnect(ssh, "Protocol error: expected packet type %d, got %d", expected_type, type)) != 0) return ...
103,641,640,367,204,680,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,421
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_read_poll1(struct ssh *ssh, u_char *typep) { struct session_state *state = ssh->state; u_int len, padded_len; const char *emsg; const u_char *cp; u_char *p; u_int checksum, stored_checksum; int r; *typep = SSH_MSG_NONE; /* Check if input size is less than minimum packet size. */ if (sshbuf_len(st...
4,985,989,109,492,157,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,422
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_read_seqnr(struct ssh *ssh, u_char *typep, u_int32_t *seqnr_p) { struct session_state *state = ssh->state; int len, r, ms_remain, cont; fd_set *setp; char buf[8192]; struct timeval timeout, start, *timeoutp = NULL; DBG(debug("packet_read()")); setp = calloc(howmany(state->connection_in + 1, NFD...
213,840,795,064,844,160,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,423
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_restore_state(struct ssh *ssh, struct ssh *backup_state) { struct ssh *tmp; u_int len; int r; tmp = backup_state; backup_state = ssh; ssh = tmp; ssh->state->connection_in = backup_state->state->connection_in; backup_state->state->connection_in = -1; ssh->state->connection_out = backup_state->st...
110,312,515,672,508,310,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,424
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_send1(struct ssh *ssh) { struct session_state *state = ssh->state; u_char buf[8], *cp; int r, padding, len; u_int checksum; /* * If using packet compression, compress the payload of the outgoing * packet. */ if (state->packet_compression) { sshbuf_reset(state->compression_buffer); /* Skip pa...
196,497,674,004,934,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,425
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_send2_wrapped(struct ssh *ssh) { struct session_state *state = ssh->state; u_char type, *cp, macbuf[SSH_DIGEST_MAX_LENGTH]; u_char padlen, pad = 0; u_int authlen = 0, aadlen = 0; u_int len; struct sshenc *enc = NULL; struct sshmac *mac = NULL; struct sshcomp *comp = NULL; int r, block_size; if...
138,787,144,107,559,760,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,426
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_send_debug(struct ssh *ssh, const char *fmt,...) { char buf[1024]; va_list args; int r; if (compat20 && (ssh->compat & SSH_BUG_DEBUG)) return; va_start(args, fmt); vsnprintf(buf, sizeof(buf), fmt, args); va_end(args); if (compat20) { if ((r = sshpkt_start(ssh, SSH2_MSG_DEBUG)) != 0 || (r...
12,317,633,291,374,964,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,427
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_send_ignore(struct ssh *ssh, int nbytes) { u_int32_t rnd = 0; int r, i; if ((r = sshpkt_start(ssh, compat20 ? SSH2_MSG_IGNORE : SSH_MSG_IGNORE)) != 0 || (r = sshpkt_put_u32(ssh, nbytes)) != 0) fatal("%s: %s", __func__, ssh_err(r)); for (i = 0; i < nbytes; i++) { if (i % 4 == 0) rnd = ar...
189,965,511,304,733,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,428
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_alive_timeouts(struct ssh *ssh, int ka) { ssh->state->keep_alive_timeouts = ka; }
312,295,543,162,285,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,429
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_authenticated(struct ssh *ssh) { ssh->state->after_authentication = 1; }
65,955,799,443,583,705,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,430
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_compress_hooks(struct ssh *ssh, void *ctx, void *(*allocfunc)(void *, u_int, u_int), void (*freefunc)(void *, void *)) { ssh->state->compression_out_stream.zalloc = (alloc_func)allocfunc; ssh->state->compression_out_stream.zfree = (free_func)freefunc; ssh->state->compression_out_stream.opaque ...
173,469,413,680,102,920,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,431
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_connection(struct ssh *ssh, int fd_in, int fd_out) { struct session_state *state; const struct sshcipher *none = cipher_by_name("none"); int r; if (none == NULL) { error("%s: cannot load cipher 'none'", __func__); return NULL; } if (ssh == NULL) ssh = ssh_alloc_session_state(); if (ssh == N...
165,996,363,037,786,880,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,432
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_encryption_key(struct ssh *ssh, const u_char *key, u_int keylen, int number) { #ifndef WITH_SSH1 fatal("no SSH protocol 1 support"); #else /* WITH_SSH1 */ struct session_state *state = ssh->state; const struct sshcipher *cipher = cipher_by_number(number); int r; const char *wmsg; if (cipher == NUL...
111,784,309,480,613,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,433
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_interactive(struct ssh *ssh, int interactive, int qos_interactive, int qos_bulk) { struct session_state *state = ssh->state; if (state->set_interactive_called) return; state->set_interactive_called = 1; /* Record that we are in interactive mode. */ state->interactive_mode = interactive; /* Onl...
59,693,212,211,580,280,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,434
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_nonblocking(struct ssh *ssh) { /* Set the socket into non-blocking mode. */ set_nonblock(ssh->state->connection_in); if (ssh->state->connection_out != ssh->state->connection_in) set_nonblock(ssh->state->connection_out); }
212,603,299,277,814,370,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,435
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_server(struct ssh *ssh) { ssh->state->server_side = 1; }
24,350,508,412,062,420,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,436
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_state(struct ssh *ssh, struct sshbuf *m) { struct session_state *state = ssh->state; const u_char *ssh1key, *ivin, *ivout, *keyin, *keyout, *input, *output; size_t ssh1keylen, rlen, slen, ilen, olen; int r; u_int ssh1cipher = 0; u_int64_t sent_bytes = 0, recv_bytes = 0; if (!compat20) { if ((r ...
66,009,129,008,373,130,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,437
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_timeout(struct ssh *ssh, int timeout, int count) { struct session_state *state = ssh->state; if (timeout <= 0 || count <= 0) { state->packet_timeout_ms = -1; return; } if ((INT_MAX / 1000) / count < timeout) state->packet_timeout_ms = INT_MAX; else state->packet_timeout_ms = timeout * count...
120,549,427,475,490,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,438
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_set_tos(struct ssh *ssh, int tos) { #ifndef IP_TOS_IS_BROKEN if (!ssh_packet_connection_is_on_socket(ssh)) return; switch (ssh_packet_connection_af(ssh)) { # ifdef IP_TOS case AF_INET: debug3("%s: set IP_TOS 0x%02x", __func__, tos); if (setsockopt(ssh->state->connection_in, IPPROTO_IP, IP_TOS,...
237,651,806,509,456,360,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,439
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_start_compression(struct ssh *ssh, int level) { int r; if (ssh->state->packet_compression && !compat20) return SSH_ERR_INTERNAL_ERROR; ssh->state->packet_compression = 1; if ((r = ssh_packet_init_compression(ssh)) != 0 || (r = start_compression_in(ssh)) != 0 || (r = start_compression_out(ssh...
221,096,976,540,876,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,440
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_stop_discard(struct ssh *ssh) { struct session_state *state = ssh->state; int r; if (state->packet_discard_mac) { char buf[1024]; memset(buf, 'a', sizeof(buf)); while (sshbuf_len(state->incoming_packet) < PACKET_MAX_SIZE) if ((r = sshbuf_put(state->incoming_packet, buf, sizeof(buf)...
105,125,215,767,981,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,441
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_write_poll(struct ssh *ssh) { struct session_state *state = ssh->state; int len = sshbuf_len(state->output); int cont, r; if (len > 0) { cont = 0; len = roaming_write(state->connection_out, sshbuf_ptr(state->output), len, &cont); if (len == -1) { if (errno == EINTR || errno == EAGAIN || ...
28,399,258,868,906,770,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,442
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_packet_write_wait(struct ssh *ssh) { fd_set *setp; int ret, r, ms_remain = 0; struct timeval start, timeout, *timeoutp = NULL; struct session_state *state = ssh->state; setp = calloc(howmany(state->connection_out + 1, NFDBITS), sizeof(fd_mask)); if (setp == NULL) return SSH_ERR_ALLOC_FAIL; if ((r = s...
132,156,431,366,710,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,443
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_remote_ipaddr(struct ssh *ssh) { /* Check whether we have cached the ipaddr. */ if (ssh->remote_ipaddr == NULL) ssh->remote_ipaddr = ssh_packet_connection_is_on_socket(ssh) ? get_peer_ipaddr(ssh->state->connection_in) : strdup("UNKNOWN"); if (ssh->remote_ipaddr == NULL) return "UNKNOWN"; return ...
62,294,224,613,897,260,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,444
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
ssh_set_newkeys(struct ssh *ssh, int mode) { struct session_state *state = ssh->state; struct sshenc *enc; struct sshmac *mac; struct sshcomp *comp; struct sshcipher_ctx *cc; u_int64_t *max_blocks; const char *wmsg; int r, crypt_type; debug2("set_newkeys: mode %d", mode); if (mode == MODE_OUT) { cc = &sta...
42,320,962,499,399,336,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,445
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_disconnect(struct ssh *ssh, const char *fmt,...) { char buf[1024]; va_list args; int r; va_start(args, fmt); vsnprintf(buf, sizeof(buf), fmt, args); va_end(args); if (compat20) { if ((r = sshpkt_start(ssh, SSH2_MSG_DISCONNECT)) != 0 || (r = sshpkt_put_u32(ssh, SSH2_DISCONNECT_PROTOCOL_ERROR)) !=...
168,039,545,365,341,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,446
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_fatal(struct ssh *ssh, const char *tag, int r) { switch (r) { case SSH_ERR_CONN_CLOSED: logit("Connection closed by %.200s", ssh_remote_ipaddr(ssh)); cleanup_exit(255); case SSH_ERR_CONN_TIMEOUT: logit("Connection to %.200s timed out", ssh_remote_ipaddr(ssh)); cleanup_exit(255); case SSH_ERR_DISCONNE...
320,503,024,431,200,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,447
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get(struct ssh *ssh, void *valp, size_t len) { return sshbuf_get(ssh->state->incoming_packet, valp, len); }
148,655,481,626,581,290,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,448
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get_bignum2(struct ssh *ssh, BIGNUM *v) { return sshbuf_get_bignum2(ssh->state->incoming_packet, v); }
69,110,207,480,766,390,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,449
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get_cstring(struct ssh *ssh, char **valp, size_t *lenp) { return sshbuf_get_cstring(ssh->state->incoming_packet, valp, lenp); }
301,646,661,156,738,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,450
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get_ec(struct ssh *ssh, EC_POINT *v, const EC_GROUP *g) { return sshbuf_get_ec(ssh->state->incoming_packet, v, g); }
164,161,861,693,111,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,451
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get_string(struct ssh *ssh, u_char **valp, size_t *lenp) { return sshbuf_get_string(ssh->state->incoming_packet, valp, lenp); }
16,576,668,932,739,193,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,452
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get_u32(struct ssh *ssh, u_int32_t *valp) { return sshbuf_get_u32(ssh->state->incoming_packet, valp); }
37,685,757,525,727,338,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,453
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get_u64(struct ssh *ssh, u_int64_t *valp) { return sshbuf_get_u64(ssh->state->incoming_packet, valp); }
163,440,716,258,757,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,454
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_get_u8(struct ssh *ssh, u_char *valp) { return sshbuf_get_u8(ssh->state->incoming_packet, valp); }
69,244,756,307,237,390,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,455
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_ptr(struct ssh *ssh, size_t *lenp) { if (lenp != NULL) *lenp = sshbuf_len(ssh->state->incoming_packet); return sshbuf_ptr(ssh->state->incoming_packet); }
81,948,093,654,400,320,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,456
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put(struct ssh *ssh, const void *v, size_t len) { return sshbuf_put(ssh->state->outgoing_packet, v, len); }
140,434,703,347,308,240,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,457
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_bignum1(struct ssh *ssh, const BIGNUM *v) { return sshbuf_put_bignum1(ssh->state->outgoing_packet, v); }
237,300,904,267,708,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,458
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_bignum2(struct ssh *ssh, const BIGNUM *v) { return sshbuf_put_bignum2(ssh->state->outgoing_packet, v); }
250,701,420,568,368,860,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,459
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_cstring(struct ssh *ssh, const void *v) { return sshbuf_put_cstring(ssh->state->outgoing_packet, v); }
46,159,279,060,261,510,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,460
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_ec(struct ssh *ssh, const EC_POINT *v, const EC_GROUP *g) { return sshbuf_put_ec(ssh->state->outgoing_packet, v, g); }
299,909,681,529,420,580,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,461
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_string(struct ssh *ssh, const void *v, size_t len) { return sshbuf_put_string(ssh->state->outgoing_packet, v, len); }
55,897,536,127,896,960,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,462
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_stringb(struct ssh *ssh, const struct sshbuf *v) { return sshbuf_put_stringb(ssh->state->outgoing_packet, v); }
292,736,908,954,261,560,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,463
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_u32(struct ssh *ssh, u_int32_t val) { return sshbuf_put_u32(ssh->state->outgoing_packet, val); }
57,944,483,715,061,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,464
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_u64(struct ssh *ssh, u_int64_t val) { return sshbuf_put_u64(ssh->state->outgoing_packet, val); }
120,961,037,857,980,220,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,465
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_put_u8(struct ssh *ssh, u_char val) { return sshbuf_put_u8(ssh->state->outgoing_packet, val); }
72,249,930,047,336,160,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,466
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_putb(struct ssh *ssh, const struct sshbuf *b) { return sshbuf_putb(ssh->state->outgoing_packet, b); }
287,058,521,431,133,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,467
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_send(struct ssh *ssh) { if (compat20) return ssh_packet_send2(ssh); else return ssh_packet_send1(ssh); }
313,146,023,509,939,960,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,468
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
sshpkt_start(struct ssh *ssh, u_char type) { u_char buf[9]; int len; DBG(debug("packet_start[%d]", type)); len = compat20 ? 6 : 9; memset(buf, 0, len - 1); buf[len - 1] = type; sshbuf_reset(ssh->state->outgoing_packet); return sshbuf_put(ssh->state->outgoing_packet, buf, len); }
314,690,480,849,303,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,469
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
start_compression_in(struct ssh *ssh) { if (ssh->state->compression_in_started == 1) inflateEnd(&ssh->state->compression_in_stream); switch (inflateInit(&ssh->state->compression_in_stream)) { case Z_OK: ssh->state->compression_in_started = 1; break; case Z_MEM_ERROR: return SSH_ERR_ALLOC_FAIL; default: r...
110,986,117,978,125,620,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,470
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
start_compression_out(struct ssh *ssh, int level) { if (level < 1 || level > 9) return SSH_ERR_INVALID_ARGUMENT; debug("Enabling compression at level %d.", level); if (ssh->state->compression_out_started == 1) deflateEnd(&ssh->state->compression_out_stream); switch (deflateInit(&ssh->state->compression_out_stre...
331,757,622,507,439,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,471
mindrot
2fecfd486bdba9f51b3a789277bb0733ca36e1c0
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
None
0
uncompress_buffer(struct ssh *ssh, struct sshbuf *in, struct sshbuf *out) { u_char buf[4096]; int r, status; if (ssh->state->compression_in_started != 1) return SSH_ERR_INTERNAL_ERROR; if ((ssh->state->compression_in_stream.next_in = sshbuf_mutable_ptr(in)) == NULL) return SSH_ERR_INTERNAL_ERROR; ssh->s...
238,781,120,210,729,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
https://nvd.nist.gov/vuln/detail/CVE-2016-1907
18,472
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_pk_ecc_get_sexp (gcry_sexp_t *r_sexp, int mode, mpi_ec_t ec) { gpg_err_code_t rc; gcry_mpi_t mpi_G = NULL; gcry_mpi_t mpi_Q = NULL; if (!ec->p || !ec->a || !ec->b || !ec->G || !ec->n || !ec->h) return GPG_ERR_BAD_CRYPT_CTX; if (mode == GCRY_PK_GET_SECKEY && !ec->d) return GPG_ERR_NO_SECKEY; ...
259,695,220,459,142,540,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,473
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
check_secret_key (ECC_secret_key *sk, mpi_ec_t ec, int flags) { int rc = 1; mpi_point_struct Q; gcry_mpi_t x1, y1; gcry_mpi_t x2 = NULL; gcry_mpi_t y2 = NULL; point_init (&Q); x1 = mpi_new (0); if (ec->model == MPI_EC_MONTGOMERY) y1 = NULL; else y1 = mpi_new (0); /* G in E(F_p) */ if (!_...
106,847,209,903,371,980,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,474
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
compute_keygrip (gcry_md_hd_t md, gcry_sexp_t keyparms) { #define N_COMPONENTS 7 static const char names[N_COMPONENTS] = "pabgnhq"; gpg_err_code_t rc; gcry_sexp_t l1; gcry_mpi_t values[N_COMPONENTS]; int idx; char *curvename = NULL; int flags = 0; enum gcry_mpi_ec_models model = 0; enum ecc_dialects d...
264,009,301,246,202,420,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,475
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ecc_check_secret_key (gcry_sexp_t keyparms) { gcry_err_code_t rc; gcry_sexp_t l1 = NULL; int flags = 0; char *curvename = NULL; gcry_mpi_t mpi_g = NULL; gcry_mpi_t mpi_q = NULL; ECC_secret_key sk; mpi_ec_t ec = NULL; memset (&sk, 0, sizeof sk); /* Look for flags. */ l1 = sexp_find_token (keyparm...
219,454,070,513,966,700,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,476
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ecc_encrypt_raw (gcry_sexp_t *r_ciph, gcry_sexp_t s_data, gcry_sexp_t keyparms) { unsigned int nbits; gcry_err_code_t rc; struct pk_encoding_ctx ctx; gcry_sexp_t l1 = NULL; char *curvename = NULL; gcry_mpi_t mpi_g = NULL; gcry_mpi_t mpi_q = NULL; gcry_mpi_t mpi_s = NULL; gcry_mpi_t mpi_e = NULL; gcr...
323,278,242,441,543,250,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,477
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ecc_generate (const gcry_sexp_t genparms, gcry_sexp_t *r_skey) { gpg_err_code_t rc; unsigned int nbits; elliptic_curve_t E; ECC_secret_key sk; gcry_mpi_t Gx = NULL; gcry_mpi_t Gy = NULL; gcry_mpi_t Qx = NULL; gcry_mpi_t Qy = NULL; char *curve_name = NULL; gcry_sexp_t l1; mpi_ec_t ctx = NULL; gcr...
274,620,639,322,933,060,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,478
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ecc_get_nbits (gcry_sexp_t parms) { gcry_sexp_t l1; gcry_mpi_t p; unsigned int nbits = 0; char *curve; l1 = sexp_find_token (parms, "p", 1); if (!l1) { /* Parameter P not found - check whether we have "curve". */ l1 = sexp_find_token (parms, "curve", 5); if (!l1) return 0; /* Neith...
37,589,650,213,313,683,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,479
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ecc_sign (gcry_sexp_t *r_sig, gcry_sexp_t s_data, gcry_sexp_t keyparms) { gcry_err_code_t rc; struct pk_encoding_ctx ctx; gcry_mpi_t data = NULL; gcry_sexp_t l1 = NULL; char *curvename = NULL; gcry_mpi_t mpi_g = NULL; gcry_mpi_t mpi_q = NULL; ECC_secret_key sk; gcry_mpi_t sig_r = NULL; gcry_mpi_t si...
217,097,261,819,283,030,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,480
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ecc_verify (gcry_sexp_t s_sig, gcry_sexp_t s_data, gcry_sexp_t s_keyparms) { gcry_err_code_t rc; struct pk_encoding_ctx ctx; gcry_sexp_t l1 = NULL; char *curvename = NULL; gcry_mpi_t mpi_g = NULL; gcry_mpi_t mpi_q = NULL; gcry_mpi_t sig_r = NULL; gcry_mpi_t sig_s = NULL; gcry_mpi_t data = NULL; ECC_...
338,850,103,646,666,860,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,481
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
nist_generate_key (ECC_secret_key *sk, elliptic_curve_t *E, mpi_ec_t ctx, int flags, unsigned int nbits, gcry_mpi_t *r_x, gcry_mpi_t *r_y) { mpi_point_struct Q; gcry_random_level_t random_level; gcry_mpi_t x, y; const unsigned int pbits = mpi_get_nbits (E->p); point_init...
322,816,882,317,384,830,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,482
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
selftest_sign (gcry_sexp_t pkey, gcry_sexp_t skey) { /* Sample data from RFC 6979 section A.2.5, hash is of message "sample" */ static const char sample_data[] = "(data (flags rfc6979)" " (hash sha256 #af2bdbe1aa9b6ec1e2ade1d694f41fc71a831d0268e98915" /**/ "62113d8a62add1bf#))"; static const...
123,247,698,962,545,200,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,483
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
selftests_ecdsa (selftest_report_func_t report) { const char *what; const char *errtxt; gcry_error_t err; gcry_sexp_t skey = NULL; gcry_sexp_t pkey = NULL; what = "convert"; err = sexp_sscan (&skey, NULL, sample_secret_key_secp256, strlen (sample_secret_key_secp256)); if (!err) ...
207,154,065,831,880,450,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,484
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
test_ecdh_only_keys (ECC_secret_key *sk, unsigned int nbits, int flags) { ECC_public_key pk; gcry_mpi_t test; mpi_point_struct R_; gcry_mpi_t x0, x1; mpi_ec_t ec; if (DBG_CIPHER) log_debug ("Testing ECDH only key.\n"); point_init (&R_); pk.E = _gcry_ecc_curve_copy (sk->E); point_init (&pk.Q); ...
127,602,031,859,430,840,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,485
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
test_keys (ECC_secret_key *sk, unsigned int nbits) { ECC_public_key pk; gcry_mpi_t test = mpi_new (nbits); mpi_point_struct R_; gcry_mpi_t c = mpi_new (nbits); gcry_mpi_t out = mpi_new (nbits); gcry_mpi_t r = mpi_new (nbits); gcry_mpi_t s = mpi_new (nbits); if (DBG_CIPHER) log_debug ("Testing key.\...
248,530,346,338,694,400,000,000,000,000,000,000,000
ecc.c
131,445,798,721,807,720,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,486
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_free_parts (mpi_point_t p) { mpi_free (p->x); p->x = NULL; mpi_free (p->y); p->y = NULL; mpi_free (p->z); p->z = NULL; }
165,985,889,315,299,930,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,487
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_get (gcry_mpi_t x, gcry_mpi_t y, gcry_mpi_t z, mpi_point_t point) { if (x) mpi_set (x, point->x); if (y) mpi_set (y, point->y); if (z) mpi_set (z, point->z); }
13,776,274,890,096,877,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,488
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_init (mpi_point_t p) { p->x = mpi_new (0); p->y = mpi_new (0); p->z = mpi_new (0); }
332,268,264,738,742,900,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,489
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_log (const char *name, mpi_point_t point, mpi_ec_t ctx) { gcry_mpi_t x, y; char buf[100]; if (!point) { snprintf (buf, sizeof buf - 1, "%s.*", name); log_mpidump (buf, NULL); return; } snprintf (buf, sizeof buf - 1, "%s.X", name); if (ctx) { x = mpi_new (0...
236,219,024,822,595,630,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,490
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_new (unsigned int nbits) { mpi_point_t p; (void)nbits; /* Currently not used. */ p = xmalloc (sizeof *p); _gcry_mpi_point_init (p); return p; }
274,772,945,138,723,700,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,491
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_release (mpi_point_t p) { if (p) { _gcry_mpi_point_free_parts (p); xfree (p); } }
175,748,338,646,073,500,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,492
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_set (mpi_point_t point, gcry_mpi_t x, gcry_mpi_t y, gcry_mpi_t z) { if (!point) point = mpi_point_new (0); if (x) mpi_set (point->x, x); else mpi_clear (point->x); if (y) mpi_set (point->y, y); else mpi_clear (point->y); if (z) mpi_set (point->z,...
289,225,046,992,560,350,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,493
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_snatch_get (gcry_mpi_t x, gcry_mpi_t y, gcry_mpi_t z, mpi_point_t point) { mpi_snatch (x, point->x); mpi_snatch (y, point->y); mpi_snatch (z, point->z); xfree (point); }
323,078,943,309,719,960,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,494
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
_gcry_mpi_point_snatch_set (mpi_point_t point, gcry_mpi_t x, gcry_mpi_t y, gcry_mpi_t z) { if (!point) point = mpi_point_new (0); if (x) mpi_snatch (point->x, x); else mpi_clear (point->x); if (y) mpi_snatch (point->y, y); else mpi_clear (point->y); if (z) ...
158,791,468,565,102,770,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,495
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_addm (gcry_mpi_t w, gcry_mpi_t u, gcry_mpi_t v, mpi_ec_t ctx) { mpi_add (w, u, v); ec_mod (w, ctx); }
23,125,832,289,370,590,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,496
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_get_a_is_pminus3 (mpi_ec_t ec) { gcry_mpi_t tmp; if (!ec->t.valid.a_is_pminus3) { ec->t.valid.a_is_pminus3 = 1; tmp = mpi_alloc_like (ec->p); mpi_sub_ui (tmp, ec->p, 3); ec->t.a_is_pminus3 = !mpi_cmp (ec->a, tmp); mpi_free (tmp); } return ec->t.a_is_pminus3; }
281,101,098,062,569,120,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,497
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_invm (gcry_mpi_t x, gcry_mpi_t a, mpi_ec_t ctx) { if (!mpi_invm (x, a, ctx->p)) { log_error ("ec_invm: inverse does not exist:\n"); log_mpidump (" a", a); log_mpidump (" p", ctx->p); } }
213,080,133,563,899,730,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,498
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_mod (gcry_mpi_t w, mpi_ec_t ec) { if (0 && ec->dialect == ECC_DIALECT_ED25519) _gcry_mpi_ec_ed25519_mod (w); else if (ec->t.p_barrett) _gcry_mpi_mod_barrett (w, w, ec->t.p_barrett); else _gcry_mpi_mod (w, w, ec->p); }
231,473,081,044,023,600,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,499
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_mul2 (gcry_mpi_t w, gcry_mpi_t u, mpi_ec_t ctx) { mpi_lshift (w, u, 1); ec_mod (w, ctx); }
206,130,805,263,395,000,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,500
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_mulm (gcry_mpi_t w, gcry_mpi_t u, gcry_mpi_t v, mpi_ec_t ctx) { mpi_mul (w, u, v); ec_mod (w, ctx); }
178,806,772,958,782,700,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,501
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_pow2 (gcry_mpi_t w, const gcry_mpi_t b, mpi_ec_t ctx) { /* Using mpi_mul is slightly faster (at least on amd64). */ /* mpi_powm (w, b, mpi_const (MPI_C_TWO), ctx->p); */ ec_mulm (w, b, b, ctx); }
62,680,446,273,942,245,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,502
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_pow3 (gcry_mpi_t w, const gcry_mpi_t b, mpi_ec_t ctx) { mpi_powm (w, b, mpi_const (MPI_C_THREE), ctx->p); }
79,659,880,671,226,670,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,503
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_powm (gcry_mpi_t w, const gcry_mpi_t b, const gcry_mpi_t e, mpi_ec_t ctx) { mpi_powm (w, b, e, ctx->p); /* _gcry_mpi_abs (w); */ }
54,268,668,240,564,040,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,504
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
ec_subm (gcry_mpi_t w, gcry_mpi_t u, gcry_mpi_t v, mpi_ec_t ec) { mpi_sub (w, u, v); while (w->sign) mpi_add (w, w, ec->p); /*ec_mod (w, ec);*/ }
108,099,331,680,831,270,000,000,000,000,000,000,000
ec.c
140,335,214,612,362,840,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379