idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2,380 | heimdal | 1a6a6e462dc2ac6111f9e02c6852ddec4849b887 | https://github.com/heimdal/heimdal | https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887 | Security: Avoid NULL structure pointer member dereference
This can happen in the error path when processing malformed AS
requests with a NULL client name. Bug originally introduced on
Fri Feb 13 09:26:01 2015 +0100 in commit:
a873e21d7c06f22943a90a41dc733ae76799390d
kdc: base _kdc_fast_mk_error() on krb5_mk... | 1 | _kdc_as_rep(kdc_request_t r,
krb5_data *reply,
const char *from,
struct sockaddr *from_addr,
int datagram_reply)
{
krb5_context context = r->context;
krb5_kdc_configuration *config = r->config;
KDC_REQ *req = &r->req;
KDC_REQ_BODY *b = NULL;
AS_REP rep;
KDCOptions f;
krb5... | 56,768,369,760,868,760,000,000,000,000,000,000,000 | kerberos5.c | 34,202,603,459,953,700,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-17439 | In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function ... | https://nvd.nist.gov/vuln/detail/CVE-2017-17439 |
2,381 | FFmpeg | 58cf31cee7a456057f337b3102a03206d833d5e8 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/58cf31cee7a456057f337b3102a03206d833d5e8 | avcodec/x86/mpegvideodsp: Fix signedness bug in need_emu
Fixes: out of array read
Fixes: 3516/attachment-311488.dat
Found-by: Insu Yun, Georgia Tech.
Tested-by: wuninsu@gmail.com
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static void gmc_mmx(uint8_t *dst, uint8_t *src,
int stride, int h, int ox, int oy,
int dxx, int dxy, int dyx, int dyy,
int shift, int r, int width, int height)
{
const int w = 8;
const int ix = ox >> (16 + shift);
const int iy = oy >> (16 ... | 53,843,406,165,273,080,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-17081 | The gmc_mmx function in libavcodec/x86/mpegvideodsp.c in FFmpeg 2.3 and 3.4 does not properly validate widths and heights, which allows remote attackers to cause a denial of service (integer signedness error and out-of-array read) via a crafted MPEG file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17081 |
2,385 | linux | 95a762e2c8c942780948091f8f2a4f32fce1ac6f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/95a762e2c8c942780948091f8f2a4f32fce1ac6f | bpf: fix incorrect sign extension in check_alu_op()
Distinguish between
BPF_ALU64|BPF_MOV|BPF_K (load 32-bit immediate, sign-extended to 64-bit)
and BPF_ALU|BPF_MOV|BPF_K (load 32-bit immediate, zero-padded to 64-bit);
only perform sign extension in the first case.
Starting with v4.14, this is exploitable by unprivil... | 1 | static int check_alu_op(struct bpf_verifier_env *env, struct bpf_insn *insn)
{
struct bpf_reg_state *regs = cur_regs(env);
u8 opcode = BPF_OP(insn->code);
int err;
if (opcode == BPF_END || opcode == BPF_NEG) {
if (opcode == BPF_NEG) {
if (BPF_SRC(insn->code) != 0 ||
insn->src_reg != BPF_REG_0 ||
... | 195,502,195,018,736,600,000,000,000,000,000,000,000 | verifier.c | 17,590,071,972,349,169,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16995 | The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension. | https://nvd.nist.gov/vuln/detail/CVE-2017-16995 |
2,386 | linux | 373c4557d2aa362702c4c2d41288fb1e54990b7c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c | mm/pagewalk.c: report holes in hugetlb ranges
This matters at least for the mincore syscall, which will otherwise copy
uninitialized memory from the page allocator to userspace. It is
probably also a correctness error for /proc/$pid/pagemap, but I haven't
tested that.
Removing the `walk->hugetlb_entry` condition in ... | 1 | static int walk_hugetlb_range(unsigned long addr, unsigned long end,
struct mm_walk *walk)
{
struct vm_area_struct *vma = walk->vma;
struct hstate *h = hstate_vma(vma);
unsigned long next;
unsigned long hmask = huge_page_mask(h);
unsigned long sz = huge_page_size(h);
pte_t *pte;
int err = 0;
do {
... | 27,644,966,037,369,066,000,000,000,000,000,000,000 | pagewalk.c | 34,507,566,426,524,797,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-16994 | The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call. | https://nvd.nist.gov/vuln/detail/CVE-2017-16994 |
2,392 | collectd | d16c24542b2f96a194d43a73c2e5778822b9cb47 | https://github.com/collectd/collectd | https://github.com/collectd/collectd/commit/d16c24542b2f96a194d43a73c2e5778822b9cb47 | snmp plugin: Fix double free of request PDU
snmp_sess_synch_response() always frees request PDU, in both case of request
error and success. If error condition occurs inside of `while (status == 0)`
loop, double free of `req` happens.
Issue: #2291
Signed-off-by: Florian Forster <octo@collectd.org> | 1 | static int csnmp_read_table(host_definition_t *host, data_definition_t *data) {
struct snmp_pdu *req;
struct snmp_pdu *res = NULL;
struct variable_list *vb;
const data_set_t *ds;
size_t oid_list_len = data->values_len + 1;
/* Holds the last OID returned by the device. We use this in the GETNEXT
* reque... | 218,389,400,164,176,200,000,000,000,000,000,000,000 | snmp.c | 37,805,710,159,185,360,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-16820 | The csnmp_read_table function in snmp.c in the SNMP plugin in collectd before 5.6.3 is susceptible to a double free in a certain error case, which could lead to a crash (or potentially have other impact). | https://nvd.nist.gov/vuln/detail/CVE-2017-16820 |
2,395 | radare2 | 2ca9ab45891b6ae8e32b6c28c81eebca059cbe5d | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/2ca9ab45891b6ae8e32b6c28c81eebca059cbe5d | Fix #8813 - segfault in dwarf parser | 1 | static const ut8 *r_bin_dwarf_parse_comp_unit(Sdb *s, const ut8 *obuf,
RBinDwarfCompUnit *cu, const RBinDwarfDebugAbbrev *da,
size_t offset, const ut8 *debug_str, size_t debug_str_len) {
const ut8 *buf = obuf, *buf_end = obuf + (cu->hdr.length - 7);
ut64 abbr_code;
size_t i;
if (cu->hdr.length > debug_str_len... | 96,593,607,869,001,600,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-16805 | In radare2 2.0.1, libr/bin/dwarf.c allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file, related to r_bin_dwarf_parse_comp_unit in dwarf.c and sdb_set_internal in shlr/sdb/src/sdb.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16805 |
2,396 | libav | cd4663dc80323ba64989d0c103d51ad3ee0e9c2f | https://github.com/libav/libav | https://github.com/libav/libav/commit/cd4663dc80323ba64989d0c103d51ad3ee0e9c2f | smacker: add sanity check for length in smacker_decode_tree()
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
Bug-Id: 1098
Cc: libav-stable@libav.org
Signed-off-by: Sean McGovern <gseanmcg@gmail.com> | 1 | static int smacker_decode_tree(BitstreamContext *bc, HuffContext *hc,
uint32_t prefix, int length)
{
if (!bitstream_read_bit(bc)) { // Leaf
if(hc->current >= 256){
av_log(NULL, AV_LOG_ERROR, "Tree size exceeded!\n");
return AVERROR_INVALIDDATA;
... | 123,413,656,536,164,610,000,000,000,000,000,000,000 | smacker.c | 256,567,352,689,102,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16803 | In Libav through 11.11 and 12.x through 12.1, the smacker_decode_tree function in libavcodec/smacker.c does not properly restrict tree recursion, which allows remote attackers to cause a denial of service (bitstream.c:build_table() out-of-bounds read and application crash) via a crafted Smacker stream. | https://nvd.nist.gov/vuln/detail/CVE-2017-16803 |
2,397 | linux | a50829479f58416a013a4ccca791336af3c584c7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7 | Input: gtco - fix potential out-of-bound access
parse_hid_report_descriptor() has a while (i < length) loop, which
only guarantees that there's at least 1 byte in the buffer, but the
loop body can read multiple bytes which causes out-of-bounds access.
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Reviewed-by:... | 1 | static void parse_hid_report_descriptor(struct gtco *device, char * report,
int length)
{
struct device *ddev = &device->intf->dev;
int x, i = 0;
/* Tag primitive vars */
__u8 prefix;
__u8 size;
__u8 tag;
__u8 type;
__u8 data = 0;
__u16 data16 = 0;
__u32 data32 = 0;
/* For parsing logi... | 179,175,241,032,229,640,000,000,000,000,000,000,000 | gtco.c | 44,965,940,214,388,830,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16643 | The parse_hid_report_descriptor function in drivers/input/tablet/gtco.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16643 |
2,398 | ImageMagick | 2130bf6f89ded32ef0c88a11694f107c52566c53 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2130bf6f89ded32ef0c88a11694f107c52566c53 | https://github.com/ImageMagick/ImageMagick/issues/85 | 1 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 159,163,992,560,882,620,000,000,000,000,000,000,000 | wpg.c | 21,386,277,562,852,665,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16546 | The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file. | https://nvd.nist.gov/vuln/detail/CVE-2017-16546 |
2,399 | linux | 1c0edc3633b56000e18d82fc241e3995ca18a69e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1c0edc3633b56000e18d82fc241e3995ca18a69e | USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()
Andrey used the syzkaller fuzzer to find an out-of-bounds memory
access in usb_get_bos_descriptor(). The code wasn't checking that the
next usb_dev_cap_header structure could fit into the remaining buffer
space.
This patch fixes the error and also r... | 1 | int usb_get_bos_descriptor(struct usb_device *dev)
{
struct device *ddev = &dev->dev;
struct usb_bos_descriptor *bos;
struct usb_dev_cap_header *cap;
unsigned char *buffer;
int length, total_len, num, i;
int ret;
bos = kzalloc(sizeof(struct usb_bos_descriptor), GFP_KERNEL);
if (!bos)
return -ENOMEM;
/* Get... | 326,295,248,605,660,370,000,000,000,000,000,000,000 | config.c | 207,673,244,129,416,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16535 | The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel before 4.13.10 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16535 |
2,400 | linux | 2e1c42391ff2556387b3cb6308b24f6f65619feb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb | USB: core: harden cdc_parse_cdc_header
Andrey Konovalov reported a possible out-of-bounds problem for the
cdc_parse_cdc_header function. He writes:
It looks like cdc_parse_cdc_header() doesn't validate buflen
before accessing buffer[1], buffer[2] and so on. The only check
present is while (buflen > 0).
So fix thi... | 1 | int cdc_parse_cdc_header(struct usb_cdc_parsed_header *hdr,
struct usb_interface *intf,
u8 *buffer,
int buflen)
{
/* duplicates are ignored */
struct usb_cdc_union_desc *union_header = NULL;
/* duplicates are not tolerated */
struct usb_cdc_header_desc *header = NULL;
struct usb_cdc_ether_desc *ether ... | 126,505,036,785,122,100,000,000,000,000,000,000,000 | usbnet.c | 152,912,995,219,752,140,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16534 | The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16534 |
2,401 | linux | f043bfc98c193c284e2cd768fefabe18ac2fed9b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f043bfc98c193c284e2cd768fefabe18ac2fed9b | HID: usbhid: fix out-of-bounds bug
The hid descriptor identifies the length and type of subordinate
descriptors for a device. If the received hid descriptor is smaller than
the size of the struct hid_descriptor, it is possible to cause
out-of-bounds.
In addition, if bNumDescriptors of the hid descriptor have an incor... | 1 | static int usbhid_parse(struct hid_device *hid)
{
struct usb_interface *intf = to_usb_interface(hid->dev.parent);
struct usb_host_interface *interface = intf->cur_altsetting;
struct usb_device *dev = interface_to_usbdev (intf);
struct hid_descriptor *hdesc;
u32 quirks = 0;
unsigned int rsize = 0;
char *rdesc;
... | 185,715,477,481,380,400,000,000,000,000,000,000,000 | hid-core.c | 269,991,493,491,351,670,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16533 | The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16533 |
2,402 | linux | bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb | USB: fix out-of-bounds in usb_set_configuration
Andrey Konovalov reported a possible out-of-bounds problem for a USB interface
association descriptor. He writes:
It seems there's no proper size check of a USB_DT_INTERFACE_ASSOCIATION
descriptor. It's only checked that the size is >= 2 in
usb_parse_configuration(),... | 1 | static int usb_parse_configuration(struct usb_device *dev, int cfgidx,
struct usb_host_config *config, unsigned char *buffer, int size)
{
struct device *ddev = &dev->dev;
unsigned char *buffer0 = buffer;
int cfgno;
int nintf, nintf_orig;
int i, j, n;
struct usb_interface_cache *intfc;
unsigned char *buffer2;... | 240,764,745,726,812,280,000,000,000,000,000,000,000 | config.c | 169,376,391,393,654,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16531 | drivers/usb/core/config.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor. | https://nvd.nist.gov/vuln/detail/CVE-2017-16531 |
2,403 | linux | bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991 | ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor
When a USB-audio device receives a maliciously adjusted or corrupted
buffer descriptor, the USB-audio driver may access an out-of-bounce
value at its parser. This was detected by syzkaller, something like:
BUG: KASAN: slab-out-of-bounds in ... | 1 | static int snd_usb_create_streams(struct snd_usb_audio *chip, int ctrlif)
{
struct usb_device *dev = chip->dev;
struct usb_host_interface *host_iface;
struct usb_interface_descriptor *altsd;
void *control_header;
int i, protocol;
/* find audiocontrol interface */
host_iface = &usb_ifnum_to_if(dev, ctrlif)... | 17,984,538,902,999,570,000,000,000,000,000,000,000 | card.c | 34,439,524,157,371,130,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16529 | The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16529 |
2,404 | linux | fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57 | ALSA: seq: Cancel pending autoload work at unbinding device
ALSA sequencer core has a mechanism to load the enumerated devices
automatically, and it's performed in an off-load work. This seems
causing some race when a sequencer is removed while the pending
autoload work is running. As syzkaller spotted, it may lead ... | 1 | static int snd_seq_device_dev_free(struct snd_device *device)
{
struct snd_seq_device *dev = device->device_data;
put_device(&dev->dev);
return 0;
}
| 27,591,105,700,120,664,000,000,000,000,000,000,000 | seq_device.c | 141,577,229,654,057,000,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16528 | sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16528 |
2,409 | linux | 299d7572e46f98534033a9e65973f13ad1ce9047 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/299d7572e46f98534033a9e65973f13ad1ce9047 | USB: serial: console: fix use-after-free after failed setup
Make sure to reset the USB-console port pointer when console setup fails
in order to avoid having the struct usb_serial be prematurely freed by
the console code when the device is later disconnected.
Fixes: 73e487fdb75f ("[PATCH] USB console: fix disconnecti... | 1 | static int usb_console_setup(struct console *co, char *options)
{
struct usbcons_info *info = &usbcons_info;
int baud = 9600;
int bits = 8;
int parity = 'n';
int doflow = 0;
int cflag = CREAD | HUPCL | CLOCAL;
char *s;
struct usb_serial *serial;
struct usb_serial_port *port;
int retval;
struct tty_struct *tt... | 315,797,150,859,318,100,000,000,000,000,000,000,000 | console.c | 325,898,431,350,988,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16525 | The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup. | https://nvd.nist.gov/vuln/detail/CVE-2017-16525 |
2,410 | radare2 | 62e39f34b2705131a2d08aff0c2e542c6a52cf0e | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/62e39f34b2705131a2d08aff0c2e542c6a52cf0e | Fix #8764 - huge vd_aux caused pointer wraparound | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 256,945,349,868,002,700,000,000,000,000,000,000,000 | elf.c | 251,099,652,324,057,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16359 |
2,411 | radare2 | 0b973e28166636e0ff1fad80baa0385c9c09c53a | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a | Fixed crash in elf.c with 32bit r2 when shdr->sh_size > max size_t | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return fals... | 14,868,589,566,797,490,000,000,000,000,000,000,000 | elf.c | 221,902,397,084,443,050,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16357 | In radare 2.0.1, a memory corruption vulnerability exists in store_versioninfo_gnu_verdef() and store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c, as demonstrated by an invalid free. This error is due to improper sh_size validation when allocating memory. | https://nvd.nist.gov/vuln/detail/CVE-2017-16357 |
2,412 | radare2 | 0b973e28166636e0ff1fad80baa0385c9c09c53a | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a | Fixed crash in elf.c with 32bit r2 when shdr->sh_size > max size_t | 1 | static Sdb *store_versioninfo_gnu_verneed(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
ut8 *end, *need = NULL;
const char *section_name = "";
Elf_(Shdr) *link_shdr = NULL;
const char *link_section_name = "";
Sdb *sdb_vernaux = NULL;
Sdb *sdb_version = NULL;
Sdb *sdb = NULL;
int i, cnt;
if (!bin || !bin->dynstr) {... | 239,473,085,722,377,740,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-16357 | In radare 2.0.1, a memory corruption vulnerability exists in store_versioninfo_gnu_verdef() and store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c, as demonstrated by an invalid free. This error is due to improper sh_size validation when allocating memory. | https://nvd.nist.gov/vuln/detail/CVE-2017-16357 |
2,428 | radare2 | 44ded3ff35b8264f54b5a900cab32ec489d9e5b9 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/44ded3ff35b8264f54b5a900cab32ec489d9e5b9 | Fix #8743 - Crash in ELF version parser on 32bit systems | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 289,574,171,374,133,840,000,000,000,000,000,000,000 | elf.c | 35,969,027,597,949,405,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-15932 | In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c via crafted ELF files when parsing the ELF version on 32bit systems. | https://nvd.nist.gov/vuln/detail/CVE-2017-15932 |
2,429 | shadowsocks-libev | c67d275803dc6ea22c558d06b1f7ba9f94cd8de3 | https://github.com/shadowsocks/shadowsocks-libev | https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3 | Fix #1734 | 1 | build_config(char *prefix, struct server *server)
{
char *path = NULL;
int path_size = strlen(prefix) + strlen(server->port) + 20;
path = ss_malloc(path_size);
snprintf(path, path_size, "%s/.shadowsocks_%s.conf", prefix, server->port);
FILE *f = fopen(path, "w+");
if (f == NULL) {
... | 329,376,205,814,019,100,000,000,000,000,000,000,000 | manager.c | 12,158,703,574,109,284,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2017-15924 | In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions. | https://nvd.nist.gov/vuln/detail/CVE-2017-15924 |
2,430 | shadowsocks-libev | c67d275803dc6ea22c558d06b1f7ba9f94cd8de3 | https://github.com/shadowsocks/shadowsocks-libev | https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3 | Fix #1734 | 1 | construct_command_line(struct manager_ctx *manager, struct server *server)
{
static char cmd[BUF_SIZE];
char *method = manager->method;
int i;
build_config(working_dir, server);
if (server->method) method = server->method;
memset(cmd, 0, BUF_SIZE);
snprintf(cmd, BUF_SIZE,
... | 56,556,845,946,959,245,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-15924 | In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions. | https://nvd.nist.gov/vuln/detail/CVE-2017-15924 |
2,431 | src | a6981567e8e215acc1ef690c8dbb30f2d9b00a19 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19 | disallow creation (of empty files) in read-only mode; reported by
Michal Zalewski, feedback & ok deraadt@ | 1 | process_open(u_int32_t id)
{
u_int32_t pflags;
Attrib a;
char *name;
int r, handle, fd, flags, mode, status = SSH2_FX_FAILURE;
if ((r = sshbuf_get_cstring(iqueue, &name, NULL)) != 0 ||
(r = sshbuf_get_u32(iqueue, &pflags)) != 0 || /* portable flags */
(r = decode_attrib(iqueue, &a)) != 0)
fatal("%s: b... | 7,430,065,301,267,818,000,000,000,000,000,000,000 | sftp-server.c | 80,709,009,585,823,290,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2017-15906 | The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files. | https://nvd.nist.gov/vuln/detail/CVE-2017-15906 |
2,432 | linux | 71bb99a02b32b4cc4265118e85f6035ca72923f0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/71bb99a02b32b4cc4265118e85f6035ca72923f0 | Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket
same story as cmtp
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org> | 1 | int bnep_add_connection(struct bnep_connadd_req *req, struct socket *sock)
{
struct net_device *dev;
struct bnep_session *s, *ss;
u8 dst[ETH_ALEN], src[ETH_ALEN];
int err;
BT_DBG("");
baswap((void *) dst, &l2cap_pi(sock->sk)->chan->dst);
baswap((void *) src, &l2cap_pi(sock->sk)->chan->src);
/* session ... | 246,459,063,774,981,650,000,000,000,000,000,000,000 | core.c | 262,842,386,939,758,670,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-15868 | The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2017-15868 |
2,433 | linux | 4971613c1639d8e5f102c4e797c3bf8f83a5a69e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e | packet: in packet_do_bind, test fanout with bind_lock held
Once a socket has po->fanout set, it remains a member of the group
until it is destroyed. The prot_hook must be constant and identical
across sockets in the group.
If fanout_add races with packet_do_bind between the test of po->fanout
and taking the lock, the... | 1 | static int packet_do_bind(struct sock *sk, const char *name, int ifindex,
__be16 proto)
{
struct packet_sock *po = pkt_sk(sk);
struct net_device *dev_curr;
__be16 proto_curr;
bool need_rehook;
struct net_device *dev = NULL;
int ret = 0;
bool unlisted = false;
if (po->fanout)
return -EINVAL;
lock_so... | 113,256,036,162,153,370,000,000,000,000,000,000,000 | af_packet.c | 220,302,817,111,751,670,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2017-15649 | net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017... | https://nvd.nist.gov/vuln/detail/CVE-2017-15649 |
2,434 | linux | 814fb7bb7db5433757d76f4c4502c96fc53b0b5e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/814fb7bb7db5433757d76f4c4502c96fc53b0b5e | x86/fpu: Don't let userspace set bogus xcomp_bv
On x86, userspace can use the ptrace() or rt_sigreturn() system calls to
set a task's extended state (xstate) or "FPU" registers. ptrace() can
set them for another task using the PTRACE_SETREGSET request with
NT_X86_XSTATE, while rt_sigreturn() can set them for the curr... | 1 | int xstateregs_set(struct task_struct *target, const struct user_regset *regset,
unsigned int pos, unsigned int count,
const void *kbuf, const void __user *ubuf)
{
struct fpu *fpu = &target->thread.fpu;
struct xregs_state *xsave;
int ret;
if (!boot_cpu_has(X86_FEATURE_XSAVE))
return -ENODEV;
/*
* A w... | 29,945,451,952,694,290,000,000,000,000,000,000,000 | regset.c | 183,847,138,819,557,100,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-15537 | The x86/fpu (Floating Point Unit) subsystem in the Linux kernel before 4.13.5, when a processor supports the xsave feature but not the xsaves feature, does not correctly handle attempts to set reserved bits in the xstate header via the ptrace() or rt_sigreturn() system call, allowing local users to read the FPU registe... | https://nvd.nist.gov/vuln/detail/CVE-2017-15537 |
2,435 | linux | 814fb7bb7db5433757d76f4c4502c96fc53b0b5e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/814fb7bb7db5433757d76f4c4502c96fc53b0b5e | x86/fpu: Don't let userspace set bogus xcomp_bv
On x86, userspace can use the ptrace() or rt_sigreturn() system calls to
set a task's extended state (xstate) or "FPU" registers. ptrace() can
set them for another task using the PTRACE_SETREGSET request with
NT_X86_XSTATE, while rt_sigreturn() can set them for the curr... | 1 | static int __fpu__restore_sig(void __user *buf, void __user *buf_fx, int size)
{
int ia32_fxstate = (buf != buf_fx);
struct task_struct *tsk = current;
struct fpu *fpu = &tsk->thread.fpu;
int state_size = fpu_kernel_xstate_size;
u64 xfeatures = 0;
int fx_only = 0;
ia32_fxstate &= (IS_ENABLED(CONFIG_X86_32) ||
... | 182,906,564,625,953,420,000,000,000,000,000,000,000 | signal.c | 124,646,612,792,535,150,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-15537 | The x86/fpu (Floating Point Unit) subsystem in the Linux kernel before 4.13.5, when a processor supports the xsave feature but not the xsaves feature, does not correctly handle attempts to set reserved bits in the xstate header via the ptrace() or rt_sigreturn() system call, allowing local users to read the FPU registe... | https://nvd.nist.gov/vuln/detail/CVE-2017-15537 |
2,436 | radare2 | 21a6f570ba33fa9f52f1bba87f07acc4e8c178f4 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/21a6f570ba33fa9f52f1bba87f07acc4e8c178f4 | Fix #8685 - Crash in ELF version parsing | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 243,866,778,000,885,360,000,000,000,000,000,000,000 | elf.c | 132,816,774,682,898,570,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-15385 | The store_versioninfo_gnu_verdef function in libr/bin/format/elf/elf.c in radare2 2.0.0 allows remote attackers to cause a denial of service (r_read_le16 invalid write and application crash) or possibly have unspecified other impact via a crafted ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-15385 |
2,438 | linux | ac64115a66c18c01745bbd3c47a36b124e5fd8c0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ac64115a66c18c01745bbd3c47a36b124e5fd8c0 | KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM
The following program causes a kernel oops:
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <sys/ioctl.h>
#include <linux/kvm.h>
main()
{
int fd = open("/dev/kvm", O_RDWR);
ioctl(fd, KVM_CHECK_EXTENSION, KVM_CAP_PPC_HTM);
}
This happe... | 1 | int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
{
int r;
/* Assume we're using HV mode when the HV module is loaded */
int hv_enabled = kvmppc_hv_ops ? 1 : 0;
if (kvm) {
/*
* Hooray - we know which VM type we're running on. Depend on
* that rather than the guess above.
*/
hv_enabled = is_k... | 78,468,150,303,237,020,000,000,000,000,000,000,000 | powerpc.c | 261,018,331,033,590,770,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-15306 | The kvm_vm_ioctl_check_extension function in arch/powerpc/kvm/powerpc.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) via a KVM_CHECK_EXTENSION KVM_CAP_PPC_HTM ioctl call to /dev/kvm. | https://nvd.nist.gov/vuln/detail/CVE-2017-15306 |
2,439 | ImageMagick | 9fd10cf630832b36a588c1545d8736539b2f1fb5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9fd10cf630832b36a588c1545d8736539b2f1fb5 | https://github.com/ImageMagick/ImageMagick/issues/592 | 1 | static Image *ReadGIFImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BitSet(byte,bit) (((byte) & (bit)) == (bit))
#define LSBFirstOrder(x,y) (((y) << 8) | (x))
Image
*image,
*meta_image;
int
number_extensionss=0;
MagickBooleanType
status;
RectangleInfo
page;
re... | 49,173,632,362,171,760,000,000,000,000,000,000,000 | gif.c | 141,415,584,461,683,820,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-15277 | ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked v... | https://nvd.nist.gov/vuln/detail/CVE-2017-15277 |
2,442 | linux | 71105998845fb012937332fe2e806d443c09e026 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026 | ALSA: seq: Fix use-after-free at creating a port
There is a potential race window opened at creating and deleting a
port via ioctl, as spotted by fuzzing. snd_seq_create_port() creates
a port object and returns its pointer, but it doesn't take the
refcount, thus it can be deleted immediately by another thread.
Meanwh... | 1 | static int snd_seq_ioctl_create_port(struct snd_seq_client *client, void *arg)
{
struct snd_seq_port_info *info = arg;
struct snd_seq_client_port *port;
struct snd_seq_port_callback *callback;
/* it is not allowed to create the port for an another client */
if (info->addr.client != client->number)
return ... | 335,970,720,208,132,700,000,000,000,000,000,000,000 | seq_clientmgr.c | 39,112,196,288,949,430,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-15265 | Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-15265 |
2,443 | linux | 71105998845fb012937332fe2e806d443c09e026 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026 | ALSA: seq: Fix use-after-free at creating a port
There is a potential race window opened at creating and deleting a
port via ioctl, as spotted by fuzzing. snd_seq_create_port() creates
a port object and returns its pointer, but it doesn't take the
refcount, thus it can be deleted immediately by another thread.
Meanwh... | 1 | struct snd_seq_client_port *snd_seq_create_port(struct snd_seq_client *client,
int port)
{
unsigned long flags;
struct snd_seq_client_port *new_port, *p;
int num = -1;
/* sanity check */
if (snd_BUG_ON(!client))
return NULL;
if (client->num_ports >= SNDRV_SEQ_MAX_PORTS) {
pr_warn("ALSA: seq: too m... | 153,601,357,183,929,500,000,000,000,000,000,000,000 | seq_ports.c | 324,717,315,064,208,880,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-15265 | Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-15265 |
2,448 | linux | 94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6 | crypto: rng - Remove old low-level rng interface
Now that all rng implementations have switched over to the new
interface, we can remove the old low-level interface.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> | 1 | static int rngapi_reset(struct crypto_rng *tfm, const u8 *seed,
unsigned int slen)
{
u8 *buf = NULL;
u8 *src = (u8 *)seed;
int err;
if (slen) {
buf = kmalloc(slen, GFP_KERNEL);
if (!buf)
return -ENOMEM;
memcpy(buf, seed, slen);
src = buf;
}
err = crypto_old_rng_alg(tfm)->rng_reset(tfm, src, slen);
... | 261,910,434,330,675,900,000,000,000,000,000,000,000 | rng.c | 69,958,027,888,044,070,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-15116 | The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference). | https://nvd.nist.gov/vuln/detail/CVE-2017-15116 |
2,450 | linux | df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 | sctp: do not peel off an assoc from one netns to another one
Now when peeling off an association to the sock in another netns, all
transports in this assoc are not to be rehashed and keep use the old
key in hashtable.
As a transport uses sk->net as the hash key to insert into hashtable,
it would miss removing these t... | 1 | int sctp_do_peeloff(struct sock *sk, sctp_assoc_t id, struct socket **sockp)
{
struct sctp_association *asoc = sctp_id2assoc(sk, id);
struct sctp_sock *sp = sctp_sk(sk);
struct socket *sock;
int err = 0;
if (!asoc)
return -EINVAL;
/* If there is a thread waiting on more sndbuf space for
* sending on t... | 74,326,315,358,449,760,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-15115 | The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-15115 |
2,451 | linux | 2fae9e5a7babada041e2e161699ade2447a01989 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2fae9e5a7babada041e2e161699ade2447a01989 | usb: misc: legousbtower: Fix NULL pointer deference
This patch fixes a NULL pointer dereference caused by a race codition in
the probe function of the legousbtower driver. It re-structures the
probe function to only register the interface after successfully reading
the board's firmware ID.
The probe function does not... | 1 | static int tower_probe (struct usb_interface *interface, const struct usb_device_id *id)
{
struct device *idev = &interface->dev;
struct usb_device *udev = interface_to_usbdev(interface);
struct lego_usb_tower *dev = NULL;
struct usb_host_interface *iface_desc;
struct usb_endpoint_descriptor* endpoint;
struct tow... | 118,264,152,329,955,410,000,000,000,000,000,000,000 | legousbtower.c | 265,709,323,691,038,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-15102 | The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2017-15102 |
2,452 | ImageMagick | ef8f40689ac452398026c07da41656a7c87e4683 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ef8f40689ac452398026c07da41656a7c87e4683 | fix multiple memory leak in ReadYUVImage | 1 | static Image *ReadYUVImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*chroma_image,
*image,
*resize_image;
InterlaceType
interlace;
MagickBooleanType
status;
register const Quantum
*chroma_pixels;
register ssize_t
x;
register Quantum
*q;
register u... | 147,391,551,823,955,440,000,000,000,000,000,000,000 | yuv.c | 76,785,019,817,237,660,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-15033 | ImageMagick version 7.0.7-2 contains a memory leak in ReadYUVImage in coders/yuv.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-15033 |
2,453 | ImageMagick | 241988ca28139ad970c1d9717c419f41e360ddb0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/241988ca28139ad970c1d9717c419f41e360ddb0 | fix memory leak in ReadYCBCRImage as SetImageExtent failure | 1 | static Image *ReadYCBCRImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const unsigned char
*pixels;
Image
*canvas_image,
*image;
MagickBooleanType
status;
MagickOffsetType
scene;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
register const Quantum
... | 326,645,646,455,820,720,000,000,000,000,000,000,000 | ycbcr.c | 289,624,157,153,803,160,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-15032 | ImageMagick version 7.0.7-2 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-15032 |
2,455 | linux | 3e0097499839e0fe3af380410eababe5a47c4cf9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3e0097499839e0fe3af380410eababe5a47c4cf9 | scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE
When calling SG_GET_REQUEST_TABLE ioctl only a half-filled table is
returned; the remaining part will then contain stale kernel memory
information. This patch zeroes out the entire table to avoid this
issue.
Signed-off-by: Hannes Reinecke <hare@suse.com>
Revie... | 1 | sg_ioctl(struct file *filp, unsigned int cmd_in, unsigned long arg)
{
void __user *p = (void __user *)arg;
int __user *ip = p;
int result, val, read_only;
Sg_device *sdp;
Sg_fd *sfp;
Sg_request *srp;
unsigned long iflags;
if ((!(sfp = (Sg_fd *) filp->private_data)) || (!(sdp = sfp->parentdp)))
return -ENXIO;... | 130,633,992,931,209,770,000,000,000,000,000,000,000 | sg.c | 158,587,589,402,778,270,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-14991 | The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0. | https://nvd.nist.gov/vuln/detail/CVE-2017-14991 |
2,458 | weechat | f105c6f0b56fb5687b2d2aedf37cb1d1b434d556 | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/f105c6f0b56fb5687b2d2aedf37cb1d1b434d556 | logger: call strftime before replacing buffer local variables | 1 | logger_get_mask_expanded (struct t_gui_buffer *buffer, const char *mask)
{
char *mask2, *mask_decoded, *mask_decoded2, *mask_decoded3, *mask_decoded4;
char *mask_decoded5;
const char *dir_separator;
int length;
time_t seconds;
struct tm *date_tmp;
mask2 = NULL;
mask_decoded = NU... | 35,719,065,491,166,300,000,000,000,000,000,000,000 | logger.c | 315,159,599,115,154,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-14727 | logger.c in the logger plugin in WeeChat before 1.9.1 allows a crash via strftime date/time specifiers, because a buffer is not initialized. | https://nvd.nist.gov/vuln/detail/CVE-2017-14727 |
2,466 | libarchive | 5562545b5562f6d12a4ef991fae158bf4ccf92b6 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/5562545b5562f6d12a4ef991fae158bf4ccf92b6 | Avoid a read off-by-one error for UTF16 names in RAR archives.
Reported-By: OSS-Fuzz issue 573 | 1 | read_header(struct archive_read *a, struct archive_entry *entry,
char head_type)
{
const void *h;
const char *p, *endp;
struct rar *rar;
struct rar_header rar_header;
struct rar_file_header file_header;
int64_t header_size;
unsigned filename_size, end;
char *filename;
char *strp;
char pa... | 235,065,171,922,180,770,000,000,000,000,000,000,000 | archive_read_support_format_rar.c | 135,685,477,850,590,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14502 | read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. | https://nvd.nist.gov/vuln/detail/CVE-2017-14502 |
2,467 | linux | edbd58be15a957f6a760c4a514cd475217eb97fd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/edbd58be15a957f6a760c4a514cd475217eb97fd | packet: Don't write vnet header beyond end of buffer
... which may happen with certain values of tp_reserve and maclen.
Fixes: 58d19b19cd99 ("packet: vnet_hdr support for tpacket_rcv")
Signed-off-by: Benjamin Poirier <bpoirier@suse.com>
Cc: Willem de Bruijn <willemb@google.com>
Acked-by: Willem de Bruijn <willemb@goo... | 1 | static int tpacket_rcv(struct sk_buff *skb, struct net_device *dev,
struct packet_type *pt, struct net_device *orig_dev)
{
struct sock *sk;
struct packet_sock *po;
struct sockaddr_ll *sll;
union tpacket_uhdr h;
u8 *skb_head = skb->data;
int skb_len = skb->len;
unsigned int snaplen, res;
unsigned long s... | 149,788,728,253,827,170,000,000,000,000,000,000,000 | af_packet.c | 303,609,654,169,180,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-14497 | The tpacket_rcv function in net/packet/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-14497 |
2,468 | cyrus-imapd | 6bd33275368edfa71ae117de895488584678ac79 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/6bd33275368edfa71ae117de895488584678ac79 | mboxlist: fix uninitialised memory use where pattern is "Other Users" | 1 | static int mboxlist_do_find(struct find_rock *rock, const strarray_t *patterns)
{
const char *userid = rock->userid;
int isadmin = rock->isadmin;
int crossdomains = config_getswitch(IMAPOPT_CROSSDOMAINS);
char inbox[MAX_MAILBOX_BUFFER];
size_t inboxlen = 0;
size_t prefixlen, len;
size_t dom... | 31,191,443,814,716,250,000,000,000,000,000,000,000 | mboxlist.c | 175,289,968,613,334,960,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-14230 | In the mboxlist_do_find function in imap/mboxlist.c in Cyrus IMAP before 3.0.4, an off-by-one error in prefix calculation for the LIST command caused use of uninitialized memory, which might allow remote attackers to obtain sensitive information or cause a denial of service (daemon crash) via a 'LIST "" "Other Users"' ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14230 |
2,469 | FFmpeg | 9cb4eb772839c5e1de2855d126bf74ff16d13382 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/9cb4eb772839c5e1de2855d126bf74ff16d13382 | avformat/mov: Fix DoS in read_tfra()
Fixes: Missing EOF check in loop
No testcase
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int read_tfra(MOVContext *mov, AVIOContext *f)
{
MOVFragmentIndex* index = NULL;
int version, fieldlength, i, j;
int64_t pos = avio_tell(f);
uint32_t size = avio_rb32(f);
void *tmp;
if (avio_rb32(f) != MKBETAG('t', 'f', 'r', 'a')) {
return 1;
}
av_log(mov->fc, AV_LOG_VERB... | 104,151,479,220,480,280,000,000,000,000,000,000,000 | None | null | [
"CWE-834"
] | CVE-2017-14222 | In libavformat/mov.c in FFmpeg 3.3.3, a DoS in read_tfra() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MOV file, which claims a large "item_count" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU and ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14222 |
2,470 | ImageMagick | f68a98a9d385838a1c73ec960a14102949940a64 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f68a98a9d385838a1c73ec960a14102949940a64 | None | 1 | static MagickBooleanType ReadPSDLayersInternal(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 271,878,235,127,622,360,000,000,000,000,000,000,000 | None | null | [
"CWE-834"
] | CVE-2017-14174 | In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would cons... | https://nvd.nist.gov/vuln/detail/CVE-2017-14174 |
2,471 | ImageMagick | 48bcf7c39302cdf9b0d9202ad03bf1b95152c44d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/48bcf7c39302cdf9b0d9202ad03bf1b95152c44d | None | 1 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MaxTextExtent],
text[MaxTextExtent];
Image
*image;
IndexPacket
*indexes;
long
x_offset,
y_offset;
MagickBooleanType
status;
MagickPixelPacket
pixel;
QuantumAny
range... | 274,340,999,401,530,180,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-14173 | In the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation "GetQuantumRange(depth)+1" when "depth" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large "max_val... | https://nvd.nist.gov/vuln/detail/CVE-2017-14173 |
2,473 | FFmpeg | 900f39692ca0337a98a7cf047e4e2611071810c2 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/900f39692ca0337a98a7cf047e4e2611071810c2 | avformat/mxfdec: Fix DoS issues in mxf_read_index_entry_array()
Fixes: 20170829A.mxf
Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com>
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int mxf_read_index_entry_array(AVIOContext *pb, MXFIndexTableSegment *segment)
{
int i, length;
segment->nb_index_entries = avio_rb32(pb);
length = avio_rb32(pb);
if (!(segment->temporal_offset_entries=av_calloc(segment->nb_index_entries, sizeof(*segment->temporal_offset_entries))) ||
... | 286,445,280,203,623,570,000,000,000,000,000,000,000 | mxfdec.c | 199,558,052,884,155,250,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14170 | In libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large "nb_index_entries" field in the header but does not contain sufficient backing data, is provided, the loop would... | https://nvd.nist.gov/vuln/detail/CVE-2017-14170 |
2,474 | FFmpeg | 9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad | avformat/mxfdec: Fix Sign error in mxf_read_primer_pack()
Fixes: 20170829B.mxf
Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com>
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int mxf_read_primer_pack(void *arg, AVIOContext *pb, int tag, int size, UID uid, int64_t klv_offset)
{
MXFContext *mxf = arg;
int item_num = avio_rb32(pb);
int item_len = avio_rb32(pb);
if (item_len != 18) {
avpriv_request_sample(pb, "Primer pack item length %d", item_len);
ret... | 249,405,188,241,146,020,000,000,000,000,000,000,000 | mxfdec.c | 85,926,947,031,080,400,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-14169 | In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value. | https://nvd.nist.gov/vuln/detail/CVE-2017-14169 |
2,476 | libarchive | fa7438a0ff4033e4741c807394a9af6207940d71 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71 | Do something sensible for empty strings to make fuzzers happy. | 1 | atol8(const char *p, size_t char_cnt)
{
int64_t l;
int digit;
l = 0;
while (char_cnt-- > 0) {
if (*p >= '0' && *p <= '7')
digit = *p - '0';
else
break;
p++;
l <<= 3;
l |= digit;
}
return (l);
}
| 223,379,998,720,734,370,000,000,000,000,000,000,000 | archive_read_support_format_xar.c | 112,700,314,301,137,230,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14166 | libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-14166 |
2,477 | openjpeg | afb308b9ccbe129608c9205cf3bb39bbefad90b9 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/afb308b9ccbe129608c9205cf3bb39bbefad90b9 | Encoder: grow buffer size in opj_tcd_code_block_enc_allocate_data() to avoid write heap buffer overflow in opj_mqc_flush (#982) | 1 | static OPJ_BOOL opj_tcd_code_block_enc_allocate_data(opj_tcd_cblk_enc_t *
p_code_block)
{
OPJ_UINT32 l_data_size;
/* The +1 is needed for https://github.com/uclouvain/openjpeg/issues/835 */
l_data_size = 1 + (OPJ_UINT32)((p_code_block->x1 - p_code_block->x0) *
... | 311,894,405,046,094,400,000,000,000,000,000,000,000 | tcd.c | 108,827,468,075,646,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-14151 | An off-by-one error was discovered in opj_tcd_code_block_enc_allocate_data in lib/openjp2/tcd.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_mqc_flush in lib/openjp2/mqc.c and opj_t1_encode_cblk in lib/openjp2/t1... | https://nvd.nist.gov/vuln/detail/CVE-2017-14151 |
2,478 | linux | 197e7e521384a23b9e585178f3f11c9fa08274b9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9 | Sanitize 'move_pages()' permission checks
The 'move_paghes()' system call was introduced long long ago with the
same permission checks as for sending a signal (except using
CAP_SYS_NICE instead of CAP_SYS_KILL for the overriding capability).
That turns out to not be a great choice - while the system call really
only ... | 1 | SYSCALL_DEFINE6(move_pages, pid_t, pid, unsigned long, nr_pages,
const void __user * __user *, pages,
const int __user *, nodes,
int __user *, status, int, flags)
{
const struct cred *cred = current_cred(), *tcred;
struct task_struct *task;
struct mm_struct *mm;
int err;
nodemask_t task_nodes;
/* Che... | 333,020,230,899,744,470,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-14140 | The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR. | https://nvd.nist.gov/vuln/detail/CVE-2017-14140 |
2,479 | linux | 499350a5a6e7512d9ed369ed63a4244b6536f4f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/499350a5a6e7512d9ed369ed63a4244b6536f4f8 | tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0
When tcp_disconnect() is called, inet_csk_delack_init() sets
icsk->icsk_ack.rcv_mss to 0.
This could potentially cause tcp_recvmsg() => tcp_cleanup_rbuf() =>
__tcp_select_window() call path to have division by 0 issue.
So this patch initializes rcv_mss to TCP_MIN_MSS... | 1 | int tcp_disconnect(struct sock *sk, int flags)
{
struct inet_sock *inet = inet_sk(sk);
struct inet_connection_sock *icsk = inet_csk(sk);
struct tcp_sock *tp = tcp_sk(sk);
int err = 0;
int old_state = sk->sk_state;
if (old_state != TCP_CLOSE)
tcp_set_state(sk, TCP_CLOSE);
/* ABORT function of RFC793 */
if (o... | 261,705,518,300,475,030,000,000,000,000,000,000,000 | tcp.c | 294,861,604,187,295,330,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2017-14106 | The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | https://nvd.nist.gov/vuln/detail/CVE-2017-14106 |
2,480 | FFmpeg | 7e80b63ecd259d69d383623e75b318bf2bd491f6 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7e80b63ecd259d69d383623e75b318bf2bd491f6 | avformat/cinedec: Fix DoS due to lack of eof check
Fixes: loop.cine
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int cine_read_header(AVFormatContext *avctx)
{
AVIOContext *pb = avctx->pb;
AVStream *st;
unsigned int version, compression, offImageHeader, offSetup, offImageOffsets, biBitCount, length, CFA;
int vflip;
char *description;
uint64_t i;
st = avformat_new_stream(avctx, NULL);
if (!s... | 237,724,750,006,394,300,000,000,000,000,000,000,000 | cinedec.c | 179,496,134,922,045,840,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14059 | In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory r... | https://nvd.nist.gov/vuln/detail/CVE-2017-14059 |
2,481 | FFmpeg | 7ec414892ddcad88313848494b6fc5f437c9ca4a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7ec414892ddcad88313848494b6fc5f437c9ca4a | avformat/hls: Fix DoS due to infinite loop
Fixes: loop.m3u
The default max iteration count of 1000 is arbitrary and ideas for a better solution are welcome
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Previous version reviewed-by: Steven Liu <lingjiujianke@gmail.com>
Signed-off-by: Michael Niedermayer <... | 1 | static int read_data(void *opaque, uint8_t *buf, int buf_size)
{
struct playlist *v = opaque;
HLSContext *c = v->parent->priv_data;
int ret, i;
int just_opened = 0;
restart:
if (!v->needed)
return AVERROR_EOF;
if (!v->input) {
int64_t reload_interval;
struct segme... | 113,402,367,066,446,230,000,000,000,000,000,000,000 | hls.c | 135,405,588,906,469,180,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-14058 | In FFmpeg 2.4 and 3.3.3, the read_data function in libavformat/hls.c does not restrict reload attempts for an insufficient list, which allows remote attackers to cause a denial of service (infinite loop). | https://nvd.nist.gov/vuln/detail/CVE-2017-14058 |
2,482 | FFmpeg | 7f9ec5593e04827249e7aeb466da06a98a0d7329 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7f9ec5593e04827249e7aeb466da06a98a0d7329 | avformat/asfdec: Fix DoS due to lack of eof check
Fixes: loop.asf
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int asf_read_marker(AVFormatContext *s, int64_t size)
{
AVIOContext *pb = s->pb;
ASFContext *asf = s->priv_data;
int i, count, name_len, ret;
char name[1024];
avio_rl64(pb); // reserved 16 bytes
avio_rl64(pb); // ...
count = avio_rl32(pb); // markers count
... | 331,068,034,171,760,200,000,000,000,000,000,000,000 | asfdec_f.c | 59,152,081,605,058,780,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14057 | In FFmpeg 3.3.3, a DoS in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted ASF file, which claims a large "name_len" or "count" field in the header but does not contain sufficient backing data, is provided, the loops over the name and markers would ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14057 |
2,483 | FFmpeg | 96f24d1bee7fe7bac08e2b7c74db1a046c9dc0de | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/96f24d1bee7fe7bac08e2b7c74db1a046c9dc0de | avformat/rl2: Fix DoS due to lack of eof check
Fixes: loop.rl2
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static av_cold int rl2_read_header(AVFormatContext *s)
{
AVIOContext *pb = s->pb;
AVStream *st;
unsigned int frame_count;
unsigned int audio_frame_counter = 0;
unsigned int video_frame_counter = 0;
unsigned int back_size;
unsigned short sound_rate;
unsigned short rate;
unsigned short... | 106,964,341,680,444,640,000,000,000,000,000,000,000 | rl2.c | 44,458,290,018,374,470,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14056 | In libavformat/rl2.c in FFmpeg 3.3.3, a DoS in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted RL2 file, which claims a large "frame_count" field in the header but does not contain sufficient backing data, is provided, the loops (for offset and siz... | https://nvd.nist.gov/vuln/detail/CVE-2017-14056 |
2,484 | FFmpeg | 4f05e2e2dc1a89f38cd9f0960a6561083d714f1e | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/4f05e2e2dc1a89f38cd9f0960a6561083d714f1e | avformat/mvdec: Fix DoS due to lack of eof check
Fixes: loop.mv
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int mv_read_header(AVFormatContext *avctx)
{
MvContext *mv = avctx->priv_data;
AVIOContext *pb = avctx->pb;
AVStream *ast = NULL, *vst = NULL; //initialization to suppress warning
int version, i;
int ret;
avio_skip(pb, 4);
version = avio_rb16(pb);
if (version == 2) {
uin... | 61,768,510,921,436,960,000,000,000,000,000,000,000 | mvdec.c | 95,150,882,986,248,620,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14055 | In libavformat/mvdec.c in FFmpeg 3.3.3, a DoS in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MV file, which claims a large "nb_frames" field in the header but does not contain sufficient backing data, is provided, the loop over the frames would ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14055 |
2,485 | FFmpeg | 124eb202e70678539544f6268efc98131f19fa49 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/124eb202e70678539544f6268efc98131f19fa49 | avformat/rmdec: Fix DoS due to lack of eof check
Fixes: loop.ivr
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int ivr_read_header(AVFormatContext *s)
{
unsigned tag, type, len, tlen, value;
int i, j, n, count, nb_streams = 0, ret;
uint8_t key[256], val[256];
AVIOContext *pb = s->pb;
AVStream *st;
int64_t pos, offset, temp;
pos = avio_tell(pb);
tag = avio_rl32(pb);
if (tag == MKTAG('.... | 335,515,859,715,972,200,000,000,000,000,000,000,000 | rmdec.c | 242,426,628,963,703,640,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14054 | In libavformat/rmdec.c in FFmpeg 3.3.3, a DoS in ivr_read_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted IVR file, which claims a large "len" field in the header but does not contain sufficient backing data, is provided, the first type==4 loop would consume huge CPU ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14054 |
2,486 | openjpeg | e5285319229a5d77bf316bb0d3a6cbd3cb8666d9 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9 | pgxtoimage(): fix write stack buffer overflow (#997) | 1 | opj_image_t* pgxtoimage(const char *filename, opj_cparameters_t *parameters)
{
FILE *f = NULL;
int w, h, prec;
int i, numcomps, max;
OPJ_COLOR_SPACE color_space;
opj_image_cmptparm_t cmptparm; /* maximum of 1 component */
opj_image_t * image = NULL;
int adjustS, ushift, dshift, force8;
... | 218,417,184,881,972,270,000,000,000,000,000,000,000 | convert.c | 218,087,604,944,335,500,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-14041 | A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2017-14041 |
2,489 | openjpeg | 2cd30c2b06ce332dede81cccad8b334cde997281 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/2cd30c2b06ce332dede81cccad8b334cde997281 | tgatoimage(): avoid excessive memory allocation attempt, and fixes unaligned load (#995) | 1 | opj_image_t* tgatoimage(const char *filename, opj_cparameters_t *parameters)
{
FILE *f;
opj_image_t *image;
unsigned int image_width, image_height, pixel_bit_depth;
unsigned int x, y;
int flip_image = 0;
opj_image_cmptparm_t cmptparm[4]; /* maximum 4 components */
int numcomps;
OPJ_COL... | 91,259,858,852,872,260,000,000,000,000,000,000,000 | convert.c | 218,087,604,944,335,500,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-14040 | An invalid write access was discovered in bin/jp2/convert.c in OpenJPEG 2.2.0, triggering a crash in the tgatoimage function. The vulnerability may lead to remote denial of service or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14040 |
2,490 | mbedtls | d15795acd5074e0b44e71f7ede8bdfe1b48591fc | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc | Improve behaviour on fatal errors
If we didn't walk the whole chain, then there may be any kind of errors in the
part of the chain we didn't check, so setting all flags looks like the safe
thing to do. | 1 | int mbedtls_x509_crt_verify_with_profile( mbedtls_x509_crt *crt,
mbedtls_x509_crt *trust_ca,
mbedtls_x509_crl *ca_crl,
const mbedtls_x509_crt_profile *profile,
const char *cn, uint32_t *flags,
int (*f_vrfy)(void *, ... | 207,213,925,191,051,560,000,000,000,000,000,000,000 | x509_crt.c | 61,033,595,875,699,590,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2017-14032 | ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected. | https://nvd.nist.gov/vuln/detail/CVE-2017-14032 |
2,491 | tcpdump | 3c4d7c0ee30a30e5abff3d6d9586a3753101faf5 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3c4d7c0ee30a30e5abff3d6d9586a3753101faf5 | CVE-2017-13725/IPv6 R.H.: Check for the existence of all fields before fetching them.
Don't fetch the length field from the header until after we've checked
for the existence of a field at or after that field.
(Found by code inspection, not by a capture.) | 1 | rt6_print(netdissect_options *ndo, register const u_char *bp, const u_char *bp2 _U_)
{
register const struct ip6_rthdr *dp;
register const struct ip6_rthdr0 *dp0;
register const u_char *ep;
int i, len;
register const struct in6_addr *addr;
dp = (const struct ip6_rthdr *)bp;
len = dp->ip6r_len;
/* 'ep' po... | 311,722,369,782,944,900,000,000,000,000,000,000,000 | print-rt6.c | 86,158,125,580,675,730,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13725 | The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13725 |
2,492 | linux | a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0 | flow_dissector: Jump to exit code in __skb_flow_dissect
Instead of returning immediately (on a parsing failure for instance) we
jump to cleanup code. This always sets protocol values in key_control
(even on a failure there is still valid information in the key_tags that
was set before the problem was hit).
Signed-off... | 1 | bool __skb_flow_dissect(const struct sk_buff *skb,
struct flow_dissector *flow_dissector,
void *target_container,
void *data, __be16 proto, int nhoff, int hlen)
{
struct flow_dissector_key_control *key_control;
struct flow_dissector_key_basic *key_basic;
struct flow_dissector_key_addrs *key_addrs;
struct f... | 89,513,863,866,329,200,000,000,000,000,000,000,000 | flow_dissector.c | 115,762,756,331,145,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-13715 | The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-13715 |
2,493 | acpica | 37f2c716f2c6ab14c3ba557a539c3ee3224931b5 | https://github.com/acpica/acpica | https://github.com/acpica/acpica/commit/37f2c716f2c6ab14c3ba557a539c3ee3224931b5 | acpi: acpica: fix acpi operand cache leak in nseval.c
I found an ACPI cache leak in ACPI early termination and boot continuing case.
When early termination occurs due to malicious ACPI table, Linux kernel
terminates ACPI function and continues to boot process. While kernel terminates
ACPI function, kmem_cache_destroy... | 1 | AcpiNsEvaluate (
ACPI_EVALUATE_INFO *Info)
{
ACPI_STATUS Status;
ACPI_FUNCTION_TRACE (NsEvaluate);
if (!Info)
{
return_ACPI_STATUS (AE_BAD_PARAMETER);
}
if (!Info->Node)
{
/*
* Get the actual namespace node for the target object if we
... | 336,314,678,589,934,860,000,000,000,000,000,000,000 | nseval.c | 199,022,389,985,193,670,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-13695 | The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craf... | https://nvd.nist.gov/vuln/detail/CVE-2017-13695 |
2,494 | acpica | 4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0 | https://github.com/acpica/acpica | https://github.com/acpica/acpica/commit/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0 | None | 1 | AcpiPsCompleteFinalOp (
ACPI_WALK_STATE *WalkState,
ACPI_PARSE_OBJECT *Op,
ACPI_STATUS Status)
{
ACPI_STATUS Status2;
ACPI_FUNCTION_TRACE_PTR (PsCompleteFinalOp, WalkState);
/*
* Complete the last Op (if not completed), and clear the scope sta... | 293,026,534,372,290,330,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-13694 | The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel t... | https://nvd.nist.gov/vuln/detail/CVE-2017-13694 |
2,495 | acpica | 987a3b5cf7175916e2a4b6ea5b8e70f830dfe732 | https://github.com/acpica/acpica | https://github.com/acpica/acpica/commit/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732 | None | 1 | AcpiDsCreateOperands (
ACPI_WALK_STATE *WalkState,
ACPI_PARSE_OBJECT *FirstArg)
{
ACPI_STATUS Status = AE_OK;
ACPI_PARSE_OBJECT *Arg;
ACPI_PARSE_OBJECT *Arguments[ACPI_OBJ_NUM_OPERANDS];
UINT32 ArgCount = 0;
UINT32 In... | 309,137,852,343,071,430,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-13693 | The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) vi... | https://nvd.nist.gov/vuln/detail/CVE-2017-13693 |
2,505 | tcpdump | 061e7371a944588f231cb1b66d6fb070b646e376 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/061e7371a944588f231cb1b66d6fb070b646e376 | CVE-2017-13689/IKEv1: Fix addr+subnet length check.
An IPv6 address plus subnet mask is 32 bytes, not 20 bytes.
16 bytes of IPv6 address, 16 bytes of subnet mask.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | ikev1_id_print(netdissect_options *ndo, u_char tpay _U_,
const struct isakmp_gen *ext, u_int item_len,
const u_char *ep _U_, uint32_t phase, uint32_t doi _U_,
uint32_t proto _U_, int depth _U_)
{
#define USE_IPSECDOI_IN_PHASE1 1
const struct ikev1_pl_id *p;
struct ikev1_pl_id id;
static const... | 171,693,248,229,147,400,000,000,000,000,000,000,000 | print-isakmp.c | 310,153,707,156,352,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13689 | The IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13689 |
2,506 | tcpdump | 0cb1b8a434b599b8d636db029aadb757c24e39d6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/0cb1b8a434b599b8d636db029aadb757c24e39d6 | CVE-2017-13688/OLSR: Do bounds checks before we fetch data.
While we're at it, clean up some other bounds checks, so we check that
we have a complete IPv4 message header if it's IPv4 and a complete IPv6
message header if it's IPv6.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add tes... | 1 | olsr_print(netdissect_options *ndo,
const u_char *pptr, u_int length, int is_ipv6)
{
union {
const struct olsr_common *common;
const struct olsr_msg4 *msg4;
const struct olsr_msg6 *msg6;
const struct olsr_hello *hello;
const struct olsr_hello_link *hello_link;
... | 159,797,438,120,042,640,000,000,000,000,000,000,000 | print-olsr.c | 206,842,238,122,813,740,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13688 | The OLSR parser in tcpdump before 4.9.2 has a buffer over-read in print-olsr.c:olsr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13688 |
2,507 | linux | bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205 | net: check and errout if res->fi is NULL when RTM_F_FIB_MATCH is set
Syzkaller hit 'general protection fault in fib_dump_info' bug on
commit 4.13-rc5..
Guilty file: net/ipv4/fib_semantics.c
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN
Modules linked... | 1 | static int inet_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr *nlh,
struct netlink_ext_ack *extack)
{
struct net *net = sock_net(in_skb->sk);
struct rtmsg *rtm;
struct nlattr *tb[RTA_MAX+1];
struct fib_result res = {};
struct rtable *rt = NULL;
struct flowi4 fl4;
__be32 dst = 0;
__be32 src = 0;
... | 319,677,672,479,068,680,000,000,000,000,000,000,000 | route.c | 86,844,734,045,979,870,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-13686 | net/ipv4/route.c in the Linux kernel 4.13-rc1 through 4.13-rc6 is too late to check for a NULL fi field when RTM_F_FIB_MATCH is set, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via crafted system calls. NOTE: this does not affect any stable ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13686 |
2,508 | ImageMagick | e5c063a1007506ba69e97a35effcdef944421c89 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e5c063a1007506ba69e97a35effcdef944421c89 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 150,582,463,642,687,760,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2017-13658 | In ImageMagick before 6.9.9-3 and 7.x before 7.0.6-3, there is a missing NULL check in the ReadMATImage function in coders/mat.c, leading to a denial of service (assertion failure and application exit) in the DestroyImageInfo function in MagickCore/image.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-13658 |
2,509 | ImageMagick | 437a35e57db5ec078f4a3ccbf71f941276e88430 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/437a35e57db5ec078f4a3ccbf71f941276e88430 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 112,017,858,321,763,040,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-13146 | In ImageMagick before 6.9.8-5 and 7.x before 7.0.5-6, there is a memory leak in the ReadMATImage function in coders/mat.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-13146 |
2,510 | ImageMagick | b0c5222ce31e8f941fa02ff9c7a040fb2db30dbc | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b0c5222ce31e8f941fa02ff9c7a040fb2db30dbc | None | 1 | static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception)
{
const char
*option;
Image
*image;
int
jp2_status;
MagickBooleanType
status;
opj_codec_t
*jp2_codec;
opj_codestream_index_t
*codestream_index = (opj_codestream_index_t *) NULL;
opj_dparameters_t... | 72,100,147,686,150,990,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-13145 | In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash. | https://nvd.nist.gov/vuln/detail/CVE-2017-13145 |
2,511 | ImageMagick | 51b0ae01709adc1e4a9245e158ef17b85a110960 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/51b0ae01709adc1e4a9245e158ef17b85a110960 | https://github.com/ImageMagick/ImageMagick/issues/362 | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 35,756,849,636,791,006,000,000,000,000,000,000,000 | mat.c | 72,287,423,758,737,970,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-13143 | In ImageMagick before 6.9.7-6 and 7.x before 7.0.4-6, the ReadMATImage function in coders/mat.c uses uninitialized data, which might allow remote attackers to obtain sensitive information from process memory. | https://nvd.nist.gov/vuln/detail/CVE-2017-13143 |
2,514 | tcpdump | 5d0d76e88ee2d3236d7e032589d6f1d4ec5f7b1e | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/5d0d76e88ee2d3236d7e032589d6f1d4ec5f7b1e | CVE-2017-13055/IS-IS: fix an Extended IS Reachability sub-TLV
In isis_print_is_reach_subtlv() one of the case blocks did not check that
the sub-TLV "V" is actually present and could over-read the input buffer.
Add a length check to fix that and remove a useless boundary check from
a loop because the boundary is tested... | 1 | isis_print_is_reach_subtlv(netdissect_options *ndo,
const uint8_t *tptr, u_int subt, u_int subl,
const char *ident)
{
u_int te_class,priority_level,gmpls_switch_cap;
union { /* int to float conversion buffer for several subTLVs */
float f... | 96,299,723,517,562,300,000,000,000,000,000,000,000 | print-isoclns.c | 129,931,564,652,772,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13055 | The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13055 |
2,515 | tcpdump | e6511cc1a950fe1566b2236329d6b4bd0826cc7a | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e6511cc1a950fe1566b2236329d6b4bd0826cc7a | CVE-2017-13054/LLDP: add a missing length check
In lldp_private_8023_print() the case block for subtype 4 (Maximum Frame
Size TLV, IEEE 802.3bc-2009 Section 79.3.4) did not include the length
check and could over-read the input buffer, put it right.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/T... | 1 | lldp_private_8023_print(netdissect_options *ndo,
const u_char *tptr, u_int tlv_len)
{
int subtype, hexdump = FALSE;
if (tlv_len < 4) {
return hexdump;
}
subtype = *(tptr+3);
ND_PRINT((ndo, "\n\t %s Subtype (%u)",
tok2str(lldp_8023_subtype_values, "unknow... | 329,045,721,089,300,000,000,000,000,000,000,000,000 | print-lldp.c | 96,332,360,649,994,740,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13054 | The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_private_8023_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13054 |
2,516 | tcpdump | bd4e697ebd6c8457efa8f28f6831fc929b88a014 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/bd4e697ebd6c8457efa8f28f6831fc929b88a014 | CVE-2017-13053/BGP: fix VPN route target bounds checks
decode_rt_routing_info() didn't check bounds before fetching 4 octets of
the origin AS field and could over-read the input buffer, put it right.
It also fetched the varying number of octets of the route target field
from 4 octets lower than the correct offset, pu... | 1 | decode_rt_routing_info(netdissect_options *ndo,
const u_char *pptr, char *buf, u_int buflen)
{
uint8_t route_target[8];
u_int plen;
ND_TCHECK(pptr[0]);
plen = pptr[0]; /* get prefix length */
if (0 == plen) {
snprintf(buf, buflen, "default route target");
return 1;
}
... | 283,141,543,016,424,180,000,000,000,000,000,000,000 | print-bgp.c | 81,233,617,923,263,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13053 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13053 |
2,518 | tcpdump | 5d340a5ca6e420a70297cdbdf777333f18bfdab7 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/5d340a5ca6e420a70297cdbdf777333f18bfdab7 | CVE-2017-13052/CFM: refine decoding of the Sender ID TLV
In cfm_network_addr_print() add a length argument and use it to validate
the input buffer.
In cfm_print() add a length check for MAC address chassis ID. Supply
cfm_network_addr_print() with the length of its buffer and a correct
pointer to the buffer (it was of... | 1 | cfm_print(netdissect_options *ndo,
register const u_char *pptr, register u_int length)
{
const struct cfm_common_header_t *cfm_common_header;
const struct cfm_tlv_header_t *cfm_tlv_header;
const uint8_t *tptr, *tlv_ptr;
const uint8_t *namesp;
u_int names_data_remaining;
uint8_t md_name... | 32,555,146,774,735,655,000,000,000,000,000,000,000 | print-cfm.c | 53,825,550,761,470,250,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13052 | The CFM parser in tcpdump before 4.9.2 has a buffer over-read in print-cfm.c:cfm_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13052 |
2,519 | tcpdump | 289c672020280529fd382f3502efab7100d638ec | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/289c672020280529fd382f3502efab7100d638ec | CVE-2017-13051/RSVP: fix bounds checks for UNI
Fixup the part of rsvp_obj_print() that decodes the GENERALIZED_UNI
object from RFC 3476 Section 3.1 to check the sub-objects inside that
object more thoroughly.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture f... | 1 | rsvp_obj_print(netdissect_options *ndo,
const u_char *pptr, u_int plen, const u_char *tptr,
const char *ident, u_int tlen,
const struct rsvp_common_header *rsvp_com_header)
{
const struct rsvp_object_header *rsvp_obj_header;
const u_char *obj_tptr;
union {
... | 255,540,201,947,996,670,000,000,000,000,000,000,000 | print-rsvp.c | 183,071,479,882,455,940,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13051 | The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13051 |
2,520 | tcpdump | 83c64fce3a5226b080e535f5131a8a318f30e79b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/83c64fce3a5226b080e535f5131a8a318f30e79b | CVE-2017-13050/RPKI-Router: fix a few bugs
The decoder didn't properly check that the PDU length stored in the PDU
header is correct. The only check in place was in rpki_rtr_print() and it
tested whether the length is zero but that is not sufficient. Make all
necessary length and bounds checks, both generic and type-s... | 1 | rpki_rtr_pdu_print (netdissect_options *ndo, const u_char *tptr, u_int indent)
{
const rpki_rtr_pdu *pdu_header;
u_int pdu_type, pdu_len, hexdump;
const u_char *msg;
pdu_header = (const rpki_rtr_pdu *)tptr;
pdu_type = pdu_header->pdu_type;
pdu_len = EXTRACT_32BITS(pdu_header->length);
... | 39,100,150,398,832,137,000,000,000,000,000,000,000 | print-rpki-rtr.c | 31,230,535,140,950,606,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13050 | The RPKI-Router parser in tcpdump before 4.9.2 has a buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13050 |
2,522 | tcpdump | aa0858100096a3490edf93034a80e66a4d61aad5 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/aa0858100096a3490edf93034a80e66a4d61aad5 | CVE-2017-13049/Rx: add a missing bounds check for Ubik
One of the case blocks in ubik_print() didn't check bounds before
fetching 32 bits of packet data and could overread past the captured
packet data by that amount.
This fixes a buffer over-read discovered by Henri Salo from Nixu
Corporation.
Add a test using the ... | 1 | ubik_print(netdissect_options *ndo,
register const u_char *bp)
{
int ubik_op;
int32_t temp;
/*
* Print out the afs call we're invoking. The table used here was
* gleaned from ubik/ubik_int.xg
*/
ubik_op = EXTRACT_32BITS(bp + sizeof(struct rx_header));
ND_PRINT((ndo, " ubik call %s", tok2str(ub... | 129,229,518,718,701,240,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13049 | The Rx protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-rx.c:ubik_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13049 |
2,523 | tcpdump | 3c8a2b0e91d8d8947e89384dacf6b54673083e71 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3c8a2b0e91d8d8947e89384dacf6b54673083e71 | CVE-2017-13048/RSVP: fix decoding of Fast Reroute objects
In rsvp_obj_print() the case block for Class-Num 205 (FAST_REROUTE) from
RFC 4090 Section 4.1 could over-read accessing the buffer contents before
making the bounds check. Rearrange those steps the correct way around.
This fixes a buffer over-read discovered b... | 1 | rsvp_obj_print(netdissect_options *ndo,
const u_char *pptr, u_int plen, const u_char *tptr,
const char *ident, u_int tlen,
const struct rsvp_common_header *rsvp_com_header)
{
const struct rsvp_object_header *rsvp_obj_header;
const u_char *obj_tptr;
union {
... | 124,111,882,862,781,140,000,000,000,000,000,000,000 | print-rsvp.c | 257,931,279,963,889,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13048 | The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13048 |
2,524 | tcpdump | 331530a4076c69bbd2e3214db6ccbe834fb75640 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/331530a4076c69bbd2e3214db6ccbe834fb75640 | CVE-2017-13047/ES-IS: put an existing bounds check right
The bounds check in esis_print() tested one pointer at the beginning of
a loop that incremented another, make the trivial fix. While at it, make
the function print a standard marker when it detects truncated data and
update some existing ES-IS tests respectively... | 1 | esis_print(netdissect_options *ndo,
const uint8_t *pptr, u_int length)
{
const uint8_t *optr;
u_int li,esis_pdu_type,source_address_length, source_address_number;
const struct esis_header_t *esis_header;
if (!ndo->ndo_eflag)
ND_PRINT((ndo, "ES-IS"));
if (length <= 2) {
ND_PRINT((ndo, ndo->ndo_qfla... | 260,265,852,883,480,620,000,000,000,000,000,000,000 | print-isoclns.c | 129,931,564,652,772,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13047 | The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13047 |
2,525 | tcpdump | d10a0f980fe8f9407ab1ffbd612641433ebe175e | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/d10a0f980fe8f9407ab1ffbd612641433ebe175e | CVE-2017-13046/BGP: fix an existing bounds check for PMSI Tunnel
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
char b... | 302,951,600,489,979,480,000,000,000,000,000,000,000 | print-bgp.c | 318,035,422,249,115,260,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13046 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13046 |
2,526 | tcpdump | 3b36ec4e713dea9266db11975066c425aa669b6c | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3b36ec4e713dea9266db11975066c425aa669b6c | CVE-2017-13045/VQP: add some bounds checks
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | vqp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len)
{
const struct vqp_common_header_t *vqp_common_header;
const struct vqp_obj_tlv_t *vqp_obj_tlv;
const u_char *tptr;
uint16_t vqp_obj_len;
uint32_t vqp_obj_type;
int tlen;
uint8_t nitems;
tptr=pptr... | 82,155,096,392,997,310,000,000,000,000,000,000,000 | print-vqp.c | 241,670,402,630,657,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13045 | The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13045 |
2,527 | tcpdump | c2f6833dddecf2d5fb89c9c898eee9981da342ed | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c2f6833dddecf2d5fb89c9c898eee9981da342ed | CVE-2017-13044/HNCP: add DHCPv4-Data bounds checks
dhcpv4_print() in print-hncp.c had the same bug as dhcpv6_print(), apply
a fix along the same lines.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | dhcpv4_print(netdissect_options *ndo,
const u_char *cp, u_int length, int indent)
{
u_int i, t;
const u_char *tlv, *value;
uint8_t type, optlen;
i = 0;
while (i < length) {
tlv = cp + i;
type = (uint8_t)tlv[0];
optlen = (uint8_t)tlv[1];
value = tlv... | 243,689,764,915,115,500,000,000,000,000,000,000,000 | print-hncp.c | 71,707,496,757,408,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13044 | The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv4_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13044 |
2,528 | tcpdump | d515b4b4a300479cdf1a6e0d1bb95bc1f9fee514 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/d515b4b4a300479cdf1a6e0d1bb95bc1f9fee514 | CVE-2017-13043/BGP: fix decoding of MVPN route types 6 and 7
RFC 6514 Section 4.6 defines the structure for Shared Tree Join (6) and
Source Tree Join (7) multicast VPN route types. decode_multicast_vpn()
didn't implement the Source AS field of that structure properly, adjust
the offsets to put it right.
This fixes a ... | 1 | decode_multicast_vpn(netdissect_options *ndo,
const u_char *pptr, char *buf, u_int buflen)
{
uint8_t route_type, route_length, addr_length, sg_length;
u_int offset;
ND_TCHECK2(pptr[0], 2);
route_type = *pptr++;
route_length = *pptr++;
snprintf(buf, buflen,... | 143,961,896,884,613,490,000,000,000,000,000,000,000 | print-bgp.c | 81,233,617,923,263,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13043 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13043 |
2,529 | tcpdump | 39582c04cc5e34054b2936b423072fb9df2ff6ef | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/39582c04cc5e34054b2936b423072fb9df2ff6ef | CVE-2017-13042/HNCP: add DHCPv6-Data bounds checks
hncp_print_rec() validates each HNCP TLV to be within the declared as
well as the on-the-wire packet space. However, dhcpv6_print() in the same
file didn't do the same for the DHCPv6 options within the HNCP
DHCPv6-Data TLV value, which could cause an out-of-bounds rea... | 1 | dhcpv6_print(netdissect_options *ndo,
const u_char *cp, u_int length, int indent)
{
u_int i, t;
const u_char *tlv, *value;
uint16_t type, optlen;
i = 0;
while (i < length) {
tlv = cp + i;
type = EXTRACT_16BITS(tlv);
optlen = EXTRACT_16BITS(tlv + 2);
... | 233,671,212,710,950,630,000,000,000,000,000,000,000 | print-hncp.c | 333,268,703,497,273,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13042 | The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv6_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13042 |
2,530 | tcpdump | f4b9e24c7384d882a7f434cc7413925bf871d63e | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/f4b9e24c7384d882a7f434cc7413925bf871d63e | CVE-2017-13041/ICMP6: Add more bounds checks.
This fixes a buffer over-read discovered by Kim Gwan Yeong.
Add a test using the capture file supplied by the reporter(s). | 1 | icmp6_nodeinfo_print(netdissect_options *ndo, u_int icmp6len, const u_char *bp, const u_char *ep)
{
const struct icmp6_nodeinfo *ni6;
const struct icmp6_hdr *dp;
const u_char *cp;
size_t siz, i;
int needcomma;
if (ep < bp)
return;
dp = (const struct icmp6_hdr *)bp;
ni6 = (const struct icmp6_nodeinfo *)bp;
s... | 63,416,794,666,535,090,000,000,000,000,000,000,000 | print-icmp6.c | 161,565,641,176,312,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13041 | The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_nodeinfo_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13041 |
2,538 | tcpdump | 7335163a6ef82d46ff18f3e6099a157747241629 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/7335163a6ef82d46ff18f3e6099a157747241629 | CVE-2017-13038/PPP: Do bounds checking.
This fixes a buffer over-read discovered by Brian 'geeknik' Carpenter.
Add a test using the capture file supplied by Katie Holly. | 1 | handle_mlppp(netdissect_options *ndo,
const u_char *p, int length)
{
if (!ndo->ndo_eflag)
ND_PRINT((ndo, "MLPPP, "));
ND_PRINT((ndo, "seq 0x%03x, Flags [%s], length %u",
(EXTRACT_16BITS(p))&0x0fff, /* only support 12-Bit sequence space for now */
bittok2str(ppp_... | 85,055,504,616,087,220,000,000,000,000,000,000,000 | print-ppp.c | 59,187,760,187,939,720,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13038 | The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13038 |
2,540 | tcpdump | 2c2cfbd2b771ac888bc5c4a6d922f749d3822538 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/2c2cfbd2b771ac888bc5c4a6d922f749d3822538 | CVE-2017-13037/IP: Add bounds checks when printing time stamp options.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | ip_printts(netdissect_options *ndo,
register const u_char *cp, u_int length)
{
register u_int ptr;
register u_int len;
int hoplen;
const char *type;
if (length < 4) {
ND_PRINT((ndo, "[bad length %u]", length));
return;
}
ND_PRINT((ndo, " TS{"));
hoplen = ((cp[3]&0xF) != IPOPT_TS_TSONLY)... | 316,874,388,049,954,500,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13037 | The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13037 |
2,541 | tcpdump | 88b2dac837e81cf56dce05e6e7b5989332c0092d | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/88b2dac837e81cf56dce05e6e7b5989332c0092d | CVE-2017-13036/OSPFv3: Add a bounds check before fetching data
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | ospf6_decode_v3(netdissect_options *ndo,
register const struct ospf6hdr *op,
register const u_char *dataend)
{
register const rtrid_t *ap;
register const struct lsr6 *lsrp;
register const struct lsa6_hdr *lshp;
register const struct lsa6 *lsap;
register int i;
switch (op->ospf6_ty... | 290,205,176,660,766,500,000,000,000,000,000,000,000 | print-ospf6.c | 123,584,334,599,576,780,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13036 | The OSPFv3 parser in tcpdump before 4.9.2 has a buffer over-read in print-ospf6.c:ospf6_decode_v3(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13036 |
2,542 | tcpdump | 571a6f33f47e7a2394fa08f925e534135c29cf1e | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/571a6f33f47e7a2394fa08f925e534135c29cf1e | CVE-2017-13035/Properly handle IS-IS IDs shorter than a system ID (MAC address).
Some of them are variable-length, with a field giving the total length,
and therefore they can be shorter than 6 octets. If one is, don't run
past the end.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
A... | 1 | isis_print_id(const uint8_t *cp, int id_len)
{
int i;
static char id[sizeof("xxxx.xxxx.xxxx.yy-zz")];
char *pos = id;
for (i = 1; i <= SYSTEM_ID_LEN; i++) {
snprintf(pos, sizeof(id) - (pos - id), "%02x", *cp++);
pos += strlen(pos);
if (i == 2 || i == 4)
*pos++ = '.';
}
if (id... | 189,683,935,882,150,380,000,000,000,000,000,000,000 | print-isoclns.c | 129,931,564,652,772,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13035 | The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_id(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13035 |
2,543 | tcpdump | ae83295915d08a854de27a88efac5dd7353e6d3f | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/ae83295915d08a854de27a88efac5dd7353e6d3f | CVE-2017-13033/VTP: Add more bound and length checks.
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture.
Update another VTP test's .out file for this change.
Don't treate a... | 1 | vtp_print (netdissect_options *ndo,
const u_char *pptr, u_int length)
{
int type, len, tlv_len, tlv_value, mgmtd_len;
const u_char *tptr;
const struct vtp_vlan_ *vtp_vlan;
if (length < VTP_HEADER_LEN)
goto trunc;
tptr = pptr;
ND_TCHECK2(*tptr, VTP_HEADER_LEN);
type = *... | 133,576,823,966,685,880,000,000,000,000,000,000,000 | print-vtp.c | 139,431,903,099,268,550,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13033 | The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13033 |
2,544 | tcpdump | 2d669862df7cd17f539129049f6fb70d17174125 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125 | CVE-2017-13031/Check for the presence of the entire IPv6 fragment header.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture.
Clean up some whitespace in test... | 1 | frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2)
{
register const struct ip6_frag *dp;
register const struct ip6_hdr *ip6;
dp = (const struct ip6_frag *)bp;
ip6 = (const struct ip6_hdr *)bp2;
ND_TCHECK(dp->ip6f_offlg);
if (ndo->ndo_vflag) {
ND_PRINT((ndo, "fra... | 209,817,365,944,798,230,000,000,000,000,000,000,000 | print-frag6.c | 71,474,590,369,548,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13031 | The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13031 |
2,553 | tcpdump | a77ff09c46560bc895dea11dc9fe643486b056ac | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/a77ff09c46560bc895dea11dc9fe643486b056ac | CVE-2017-13027/LLDP: Fix a bounds check.
The total length of the OID is the OID length plus the length of the OID
length itself.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected ... | 1 | lldp_mgmt_addr_tlv_print(netdissect_options *ndo,
const u_char *pptr, u_int len)
{
uint8_t mgmt_addr_len, intf_num_subtype, oid_len;
const u_char *tptr;
u_int tlen;
char *mgmt_addr;
tlen = len;
tptr = pptr;
if (tlen < 1) {
return 0;
}
mgmt_addr_len ... | 243,811,099,140,121,500,000,000,000,000,000,000,000 | print-lldp.c | 96,332,360,649,994,740,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13027 | The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13027 |
2,556 | tcpdump | 5338aac7b8b880b0c5e0c15e27dadc44c5559284 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/5338aac7b8b880b0c5e0c15e27dadc44c5559284 | CVE-2017-13025/IPv6 mobility: Add a bounds check before fetching data
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file' | 1 | mobility_opt_print(netdissect_options *ndo,
const u_char *bp, const unsigned len)
{
unsigned i, optlen;
for (i = 0; i < len; i += optlen) {
ND_TCHECK(bp[i]);
if (bp[i] == IP6MOPT_PAD1)
optlen = 1;
else {
if (i + 1 < len) {
ND_TCHECK(bp[i + 1]);
optlen = bp[i + 1] + 2;
}
e... | 150,543,090,594,711,340,000,000,000,000,000,000,000 | print-mobility.c | 287,590,402,240,905,930,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13025 | The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13025 |
2,557 | tcpdump | 7d3aba9f06899d0128ef46e8a2fa143c6fad8f62 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/7d3aba9f06899d0128ef46e8a2fa143c6fad8f62 | CVE-2017-13024/IPv6 mobility: Add a bounds check before fetching data
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file' | 1 | mobility_opt_print(netdissect_options *ndo,
const u_char *bp, const unsigned len)
{
unsigned i, optlen;
for (i = 0; i < len; i += optlen) {
ND_TCHECK(bp[i]);
if (bp[i] == IP6MOPT_PAD1)
optlen = 1;
else {
if (i + 1 < len) {
ND_TCHECK(bp[i + 1]);
optlen = bp[i + 1] + 2;
}
e... | 177,883,438,511,119,000,000,000,000,000,000,000,000 | print-mobility.c | 102,370,210,272,595,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13024 | The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13024 |
2,558 | tcpdump | b8e559afaeb8fe0604a1f8e3ad4dc1445de07a00 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/b8e559afaeb8fe0604a1f8e3ad4dc1445de07a00 | CVE-2017-13023/IPv6 mobility: Add a bounds check before fetching data
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file' | 1 | mobility_opt_print(netdissect_options *ndo,
const u_char *bp, const unsigned len)
{
unsigned i, optlen;
for (i = 0; i < len; i += optlen) {
ND_TCHECK(bp[i]);
if (bp[i] == IP6MOPT_PAD1)
optlen = 1;
else {
if (i + 1 < len) {
ND_TCHECK(bp[i + 1]);
optlen = bp[i + 1] + 2;
}
e... | 254,927,641,649,680,600,000,000,000,000,000,000,000 | print-mobility.c | 226,475,948,374,881,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13023 | The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13023 |
2,560 | tcpdump | eee0b04bcfdae319c242b0b8fc3d07029ee65b8c | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/eee0b04bcfdae319c242b0b8fc3d07029ee65b8c | CVE-2017-13022/IP: Add bounds checks to ip_printroute().
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | ip_printroute(netdissect_options *ndo,
register const u_char *cp, u_int length)
{
register u_int ptr;
register u_int len;
if (length < 3) {
ND_PRINT((ndo, " [bad length %u]", length));
return;
}
if ((length + 1) & 3)
ND_PRINT((ndo, " [bad length %u]", length));
ptr = cp[2] - 1;
if... | 119,437,374,746,801,520,000,000,000,000,000,000,000 | print-ip.c | 302,675,200,471,068,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13022 | The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13022 |
2,561 | tcpdump | 67c7126062d59729cd421bb38f9594015c9907ba | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/67c7126062d59729cd421bb38f9594015c9907ba | CVE-2017-13021/ICMP6: Add a missing bounds check.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | icmp6_print(netdissect_options *ndo,
const u_char *bp, u_int length, const u_char *bp2, int fragmented)
{
const struct icmp6_hdr *dp;
const struct ip6_hdr *ip;
const struct ip6_hdr *oip;
const struct udphdr *ouh;
int dport;
const u_char *ep;
u_int prot;
dp = (const struct icmp6_hdr *)bp;
ip = (con... | 160,482,709,646,022,070,000,000,000,000,000,000,000 | print-icmp6.c | 266,796,847,639,836,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13021 | The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13021 |
2,562 | tcpdump | c5dd7bef5e54da5996dc4713284aa6266ae75b75 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75 | CVE-2017-13020/VTP: Add some missing bounds checks.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | vtp_print (netdissect_options *ndo,
const u_char *pptr, u_int length)
{
int type, len, tlv_len, tlv_value, mgmtd_len;
const u_char *tptr;
const struct vtp_vlan_ *vtp_vlan;
if (length < VTP_HEADER_LEN)
goto trunc;
tptr = pptr;
ND_TCHECK2(*tptr, VTP_HEADER_LEN);
type = *... | 252,858,056,686,542,100,000,000,000,000,000,000,000 | print-vtp.c | 295,171,477,932,998,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13020 | The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13020 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.