idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
19,671
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg) { struct option_set **opt_list = arg; char *opt, *val; char *str; const struct dhcp_optflag *optflag; struct dhcp_optflag bin_optflag; unsigned optcode; int retval, length; /* IP_PAIR needs 8 bytes, STATIC_ROUTES needs 9 max */ char buffer[9] ALI...
149,849,648,500,017,060,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,672
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static int bcast_or_ucast(struct dhcp_packet *packet, uint32_t ciaddr, uint32_t server) { if (server) return udhcp_send_kernel_packet(packet, ciaddr, CLIENT_PORT, server, SERVER_PORT); return raw_bcast_from_client_config_ifindex(packet); }
29,841,460,842,378,537,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,673
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static void change_listen_mode(int new_mode) { log1("Entering listen mode: %s", new_mode != LISTEN_NONE ? (new_mode == LISTEN_KERNEL ? "kernel" : "raw") : "none" ); listen_mode = new_mode; if (sockfd >= 0) { close(sockfd); sockfd = -1; } if (new_mode == LISTEN_KERNEL) sockfd = udhcp_listen_socket(/...
267,963,825,904,243,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,674
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static char **fill_envp(struct dhcp_packet *packet) { int envc; int i; char **envp, **curr; const char *opt_name; uint8_t *temp; uint8_t overload = 0; #define BITMAP unsigned #define BBITS (sizeof(BITMAP) * 8) #define BMASK(i) (1 << (i & (sizeof(BITMAP) * 8 - 1))) #define FOUND_OPTS(i) (found_opts[(unsigned)i / ...
58,451,251,075,529,200,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,675
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static void perform_release(uint32_t server_addr, uint32_t requested_ip) { char buffer[sizeof("255.255.255.255")]; struct in_addr temp_addr; /* send release packet */ if (state == BOUND || state == RENEWING || state == REBINDING) { temp_addr.s_addr = server_addr; strcpy(buffer, inet_ntoa(temp_addr)); temp_ad...
19,772,280,544,256,742,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,676
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static void perform_renew(void) { bb_info_msg("Performing a DHCP renew"); switch (state) { case BOUND: change_listen_mode(LISTEN_KERNEL); case RENEWING: case REBINDING: state = RENEW_REQUESTED; break; case RENEW_REQUESTED: /* impatient are we? fine, square 1 */ udhcp_run_script(NULL, "deconfig"); case RE...
70,727,659,314,851,110,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,677
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static int raw_bcast_from_client_config_ifindex(struct dhcp_packet *packet) { return udhcp_send_raw_packet(packet, /*src*/ INADDR_ANY, CLIENT_PORT, /*dst*/ INADDR_BROADCAST, SERVER_PORT, MAC_BCAST_ADDR, client_config.ifindex); }
197,168,355,617,036,750,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,678
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static NOINLINE int send_decline(/*uint32_t xid,*/ uint32_t server, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDECLINE); #if 0 /* RFC 2131 says DHCPDECLINE's x...
214,580,540,046,218,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,679
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static NOINLINE int send_discover(uint32_t xid, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr fields, * random xid field (we override it below), * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDISCOVER); packet.xid = xid; if (r...
50,813,797,879,006,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,680
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static int send_release(uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPRELEASE); /* DHCPRELEASE uses ciaddr, not "requested ip", to store IP being re...
114,214,621,899,195,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,681
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static NOINLINE int send_renew(uint32_t xid, uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; /* * RFC 2131 4.3.2 DHCPREQUEST message * ... * DHCPREQUEST generated during RENEWING state: * * 'server identifier' MUST NOT be filled in, 'requested IP address' * option MUST NOT be filled in, 'ciaddr' ...
187,055,013,299,257,920,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,682
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static NOINLINE int send_select(uint32_t xid, uint32_t server, uint32_t requested) { struct dhcp_packet packet; struct in_addr addr; /* * RFC 2131 4.3.2 DHCPREQUEST message * ... * If the DHCPREQUEST message contains a 'server identifier' * option, the message is in response to a DHCPOFFER message. * Otherwise,...
45,628,656,987,483,160,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,683
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static int udhcp_raw_socket(int ifindex) { int fd; struct sockaddr_ll sock; log1("Opening raw socket on ifindex %d", ifindex); //log2? fd = xsocket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP)); /* ^^^^^ * SOCK_DGRAM: remove link-layer headers on input (SOCK_RAW keeps them) * ETH_P_IP: want to receive only packets...
337,920,473,045,626,330,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,684
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static NOINLINE int udhcp_recv_raw_packet(struct dhcp_packet *dhcp_pkt, int fd) { int bytes; struct ip_udp_dhcp_packet packet; uint16_t check; unsigned char cmsgbuf[CMSG_LEN(sizeof(struct tpacket_auxdata))]; struct iovec iov; struct msghdr msg; struct cmsghdr *cmsg; /* used to use just safe_read(fd, &packet, s...
156,701,090,959,833,390,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,685
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static void udhcp_run_script(struct dhcp_packet *packet, const char *name) { char **envp, **curr; char *argv[3]; envp = fill_envp(packet); /* call script */ log1("Executing %s %s", client_config.script, name); argv[0] = (char*) client_config.script; argv[1] = (char*) name; argv[2] = NULL; spawn_and_wait(argv...
121,066,390,491,847,470,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,686
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
int udhcpc_main(int argc UNUSED_PARAM, char **argv) { uint8_t *message; const char *str_V, *str_h, *str_F, *str_r; IF_FEATURE_UDHCPC_ARPING(const char *str_a = "2000";) IF_FEATURE_UDHCP_PORT(char *str_P;) void *clientid_mac_ptr; llist_t *list_O = NULL; llist_t *list_x = NULL; int tryagain_timeout = 20; int dis...
287,302,697,509,222,940,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,687
busybox
352f79acbd759c14399e39baef21fc4ffe180ac2
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer) Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static const char *valid_domain_label(const char *label) { unsigned char ch; unsigned pos = 0; for (;;) { ch = *label; if ((ch|0x20) < 'a' || (ch|0x20) > 'z') { if (ch < '0' || ch > '9') { if (ch == '\0' || ch == '.') return label; /* DNS allows only '-', but we are more permissive */ if (ch...
34,438,665,356,107,934,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
https://nvd.nist.gov/vuln/detail/CVE-2016-2148
19,734
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
freelist_extract(SSL_CTX *ctx, int for_read, int sz) { SSL3_BUF_FREELIST *list; SSL3_BUF_FREELIST_ENTRY *ent = NULL; void *result = NULL; CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX); list = for_read ? ctx->rbuf_freelist : ctx->wbuf_freelist; if (list != NULL && sz == (int)list->chunklen) ent = list->head; if (ent != ...
1,375,934,267,163,180,600,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,735
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
freelist_insert(SSL_CTX *ctx, int for_read, size_t sz, void *mem) { SSL3_BUF_FREELIST *list; SSL3_BUF_FREELIST_ENTRY *ent; CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX); list = for_read ? ctx->rbuf_freelist : ctx->wbuf_freelist; if (list != NULL && (sz == list->chunklen || list->chunklen == 0) && list->len < ctx-...
127,513,747,772,195,870,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,736
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
static int ssl3_add_cert_to_buf(BUF_MEM *buf, unsigned long *l, X509 *x) { int n; unsigned char *p; n=i2d_X509(x,NULL); if (!BUF_MEM_grow_clean(buf,(int)(n+(*l)+3))) { SSLerr(SSL_F_SSL3_ADD_CERT_TO_BUF,ERR_R_BUF_LIB); return(-1); } p=(unsigned char *)&(buf->data[*l]); l2n3(n,p); i2d_X509(x,&p); *l+=n+...
84,786,508,903,028,350,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,737
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_do_write(SSL *s, int type) { int ret; ret=ssl3_write_bytes(s,type,&s->init_buf->data[s->init_off], s->init_num); if (ret < 0) return(-1); if (type == SSL3_RT_HANDSHAKE) /* should not be done for 'Hello Request's, but in that case * we'll ignore the result anyway */ ssl3_finis...
29,185,335,887,412,360,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,738
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_get_finished(SSL *s, int a, int b) { int al,i,ok; long n; unsigned char *p; #ifdef OPENSSL_NO_NEXTPROTONEG /* the mac has already been generated when we received the * change cipher spec message and is in s->s3->tmp.peer_finish_md. */ #endif n=s->method->ssl_get_message(s, a, b, SSL3_MT_FINI...
327,550,506,739,184,460,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,739
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
long ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) { unsigned char *p; unsigned long l; long n; int i,al; if (s->s3->tmp.reuse_message) { s->s3->tmp.reuse_message=0; if ((mt >= 0) && (s->s3->tmp.message_type != mt)) { al=SSL_AD_UNEXPECTED_MESSAGE; SSLerr(SSL_F_SSL3_GET_MESS...
287,281,681,343,785,950,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,740
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
unsigned long ssl3_output_cert_chain(SSL *s, X509 *x) { unsigned char *p; int i; unsigned long l=7; BUF_MEM *buf; int no_chain; if ((s->mode & SSL_MODE_NO_AUTO_CHAIN) || s->ctx->extra_certs) no_chain = 1; else no_chain = 0; /* TLSv1 sends a chain with nothing in it, instead of an alert */ buf=s->init_bu...
82,440,598,178,479,180,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,741
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_release_read_buffer(SSL *s) { if (s->s3->rbuf.buf != NULL) { freelist_insert(s->ctx, 1, s->s3->rbuf.len, s->s3->rbuf.buf); s->s3->rbuf.buf = NULL; } return 1; }
10,369,202,032,656,852,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,742
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_release_write_buffer(SSL *s) { if (s->s3->wbuf.buf != NULL) { freelist_insert(s->ctx, 0, s->s3->wbuf.len, s->s3->wbuf.buf); s->s3->wbuf.buf = NULL; } return 1; }
113,264,079,542,241,360,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,743
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_send_change_cipher_spec(SSL *s, int a, int b) { unsigned char *p; if (s->state == a) { p=(unsigned char *)s->init_buf->data; *p=SSL3_MT_CCS; s->init_num=1; s->init_off=0; s->state=b; } /* SSL3_ST_CW_CHANGE_B */ return(ssl3_do_write(s,SSL3_RT_CHANGE_CIPHER_SPEC)); }
227,891,557,872,265,300,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,744
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) { unsigned char *p,*d; int i; unsigned long l; if (s->state == a) { d=(unsigned char *)s->init_buf->data; p= &(d[4]); i=s->method->ssl3_enc->final_finish_mac(s, sender,slen,s->s3->tmp.finish_md); if (i == 0) return 0; s-...
225,292,644,812,825,800,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,745
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_setup_buffers(SSL *s) { if (!ssl3_setup_read_buffer(s)) return 0; if (!ssl3_setup_write_buffer(s)) return 0; return 1; }
160,397,453,056,800,970,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,746
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_setup_read_buffer(SSL *s) { unsigned char *p; size_t len,align=0,headerlen; if (SSL_version(s) == DTLS1_VERSION || SSL_version(s) == DTLS1_BAD_VER) headerlen = DTLS1_RT_HEADER_LENGTH; else headerlen = SSL3_RT_HEADER_LENGTH; #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0 align = (-SSL3_RT...
194,411,132,765,286,630,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,747
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl3_setup_write_buffer(SSL *s) { unsigned char *p; size_t len,align=0,headerlen; if (SSL_version(s) == DTLS1_VERSION || SSL_version(s) == DTLS1_BAD_VER) headerlen = DTLS1_RT_HEADER_LENGTH + 1; else headerlen = SSL3_RT_HEADER_LENGTH; #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0 align = (-SSL...
332,241,519,517,923,000,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,748
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl_cert_type(X509 *x, EVP_PKEY *pkey) { EVP_PKEY *pk; int ret= -1,i; if (pkey == NULL) pk=X509_get_pubkey(x); else pk=pkey; if (pk == NULL) goto err; i=pk->type; if (i == EVP_PKEY_RSA) { ret=SSL_PKEY_RSA_ENC; } else if (i == EVP_PKEY_DSA) { ret=SSL_PKEY_DSA_SIGN; } #ifndef OPENSSL_NO_EC ...
255,573,037,574,161,300,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,749
openssl
197e0ea817ad64820789d86711d55ff50d71f631
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631
Fix for TLS record tampering bug CVE-2013-4353
0
int ssl_verify_alarm_type(long type) { int al; switch(type) { case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT: case X509_V_ERR_UNABLE_TO_GET_CRL: case X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER: al=SSL_AD_UNKNOWN_CA; break; case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: case X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNAT...
16,460,406,983,852,432,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
https://nvd.nist.gov/vuln/detail/CVE-2013-4353
19,750
samba
b9b9f6738fba5c32e87cb9c36b358355b444fb9b
https://github.com/samba-team/samba
https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b
None
0
static void ctdb_listen_event(struct event_context *ev, struct fd_event *fde, uint16_t flags, void *private_data) { struct ctdb_context *ctdb = talloc_get_type(private_data, struct ctdb_context); struct ctdb_tcp *ctcp = talloc_get_type(ctdb->private_data, struct ctdb_tcp); ctdb_sock_addr addr; socklen_t l...
327,804,877,601,242,160,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4159
ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h.
https://nvd.nist.gov/vuln/detail/CVE-2013-4159
19,751
samba
b9b9f6738fba5c32e87cb9c36b358355b444fb9b
https://github.com/samba-team/samba
https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b
None
0
static int ctdb_tcp_get_address(struct ctdb_context *ctdb, const char *address, ctdb_sock_addr *addr) { if (parse_ip(address, NULL, 0, addr) == 0) { DEBUG(DEBUG_CRIT, (__location__ " Unparsable address : %s.\n", address)); return -1; } return 0; }
155,247,141,320,325,590,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4159
ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h.
https://nvd.nist.gov/vuln/detail/CVE-2013-4159
19,752
samba
b9b9f6738fba5c32e87cb9c36b358355b444fb9b
https://github.com/samba-team/samba
https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b
None
0
void ctdb_tcp_node_connect(struct event_context *ev, struct timed_event *te, struct timeval t, void *private_data) { struct ctdb_node *node = talloc_get_type(private_data, struct ctdb_node); struct ctdb_tcp_node *tnode = talloc_get_type(node->private_data, struct ctdb_tcp_node); struct ctd...
129,140,139,532,072,020,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4159
ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h.
https://nvd.nist.gov/vuln/detail/CVE-2013-4159
19,753
samba
b9b9f6738fba5c32e87cb9c36b358355b444fb9b
https://github.com/samba-team/samba
https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b
None
0
void ctdb_tcp_stop_connection(struct ctdb_node *node) { struct ctdb_tcp_node *tnode = talloc_get_type( node->private_data, struct ctdb_tcp_node); ctdb_queue_set_fd(tnode->out_queue, -1); talloc_free(tnode->connect_te); talloc_free(tnode->connect_fde); tnode->connect_fde = NULL; tnode->connect_te = NULL; if (...
277,742,162,711,226,000,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4159
ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h.
https://nvd.nist.gov/vuln/detail/CVE-2013-4159
19,754
samba
b9b9f6738fba5c32e87cb9c36b358355b444fb9b
https://github.com/samba-team/samba
https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b
None
0
void ctdb_tcp_tnode_cb(uint8_t *data, size_t cnt, void *private_data) { struct ctdb_node *node = talloc_get_type(private_data, struct ctdb_node); struct ctdb_tcp_node *tnode = talloc_get_type( node->private_data, struct ctdb_tcp_node); if (data == NULL) { node->ctdb->upcalls->node_dead(node); } ctdb_tcp_stop...
233,886,914,467,096,000,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4159
ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h.
https://nvd.nist.gov/vuln/detail/CVE-2013-4159
19,762
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_add_device_list(char **device_list[], const char *drive, unsigned int *num_drives) { if (NULL != drive) { unsigned int j; char real_device_1[PATH_MAX]; char real_device_2[PATH_MAX]; cdio_realpath(drive, real_device_1); /* Check if drive is already in list. */ for (j=0...
66,281,449,054,252,070,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,763
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_generic_free (void *p_user_data) { generic_img_private_t *p_env = p_user_data; if (NULL == p_env) return; if (p_env->source_name) free (p_env->source_name); if (NULL != p_env->cdtext) { cdtext_destroy(p_env->cdtext); p_env->cdtext = NULL; } if (p_env->fd >= 0) close (p_env->fd); i...
146,540,803,098,402,280,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,764
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_generic_init (void *user_data, int open_flags) { generic_img_private_t *p_env = user_data; if (p_env->init) { cdio_warn ("init called more than once"); return false; } p_env->fd = open (p_env->source_name, open_flags, 0); if (p_env->fd < 0) { cdio_warn ("open (%s): %s", p_env->source_...
47,952,435,505,707,970,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,765
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_generic_lseek (void *user_data, off_t offset, int whence) { generic_img_private_t *p_env = user_data; return CDIO_LSEEK(p_env->fd, offset, whence); }
195,776,600,009,891,030,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,766
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_generic_read_form1_sector (void * user_data, void *data, lsn_t lsn) { if (0 > cdio_generic_lseek(user_data, CDIO_CD_FRAMESIZE*lsn, SEEK_SET)) return DRIVER_OP_ERROR; return cdio_generic_read(user_data, data, CDIO_CD_FRAMESIZE); }
89,141,096,061,379,850,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,767
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_generic_stdio_free (void *p_user_data) { generic_img_private_t *p_env = p_user_data; if (NULL == p_env) return; if (NULL != p_env->source_name) free (p_env->source_name); if (p_env->data_source) cdio_stdio_destroy (p_env->data_source); }
180,865,783,870,359,820,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,768
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_generic_unimplemented_set_blocksize (void *p_user_data, uint16_t i_blocksize) { /* Sort of a stub here. Perhaps log a message? */ return DRIVER_OP_UNSUPPORTED; }
104,161,478,862,733,670,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,769
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_generic_unimplemented_set_speed (void *p_user_data, int i_speed) { /* Sort of a stub here. Perhaps log a message? */ return DRIVER_OP_UNSUPPORTED; }
110,780,735,827,002,270,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,770
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_is_device_generic(const char *source_name) { struct stat buf; if (0 != stat(source_name, &buf)) { cdio_warn ("Can't get file status for %s:\n%s", source_name, strerror(errno)); return false; } return (S_ISBLK(buf.st_mode) || S_ISCHR(buf.st_mode)); }
284,306,616,062,436,550,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
19,771
savannah
f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d
None
0
cdio_is_device_quiet_generic(const char *source_name) { struct stat buf; if (0 != stat(source_name, &buf)) { return false; } return (S_ISBLK(buf.st_mode) || S_ISCHR(buf.st_mode)); }
234,148,506,711,485,450,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
20,292
ghostscript
2fc463d0efbd044a8232611f0898eeb12b72a970
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2fc463d0e
None
0
lib_file_open_search_with_combine(gs_file_path_ptr lib_path, const gs_memory_t *mem, i_ctx_t *i_ctx_p, const char *fname, uint flen, char *buffer, int blen, uint *pclen, ref *pfile, gx_io_device *iodev, bool starting_arg_file, char *fmode) { strea...
313,670,445,063,028,940,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-15652
Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of ...
https://nvd.nist.gov/vuln/detail/CVE-2017-15652
20,293
ghostscript
2fc463d0efbd044a8232611f0898eeb12b72a970
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2fc463d0e
None
0
lib_file_open_search_with_no_combine(gs_file_path_ptr lib_path, const gs_memory_t *mem, i_ctx_t *i_ctx_p, const char *fname, uint flen, char *buffer, int blen, uint *pclen, ref *pfile, gx_io_device *iodev, bool starting_arg_file, char *fmode) { ...
226,463,086,561,828,420,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-15652
Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of ...
https://nvd.nist.gov/vuln/detail/CVE-2017-15652
20,294
ghostscript
2fc463d0efbd044a8232611f0898eeb12b72a970
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2fc463d0e
None
0
zopen_file(i_ctx_t *i_ctx_p, const gs_parsed_file_name_t *pfn, const char *file_access, stream **ps, gs_memory_t *mem) { gx_io_device *const iodev = pfn->iodev; int code = 0; if (pfn->fname == NULL) { /* just a device */ iodev->state = i_ctx_p; code = iodev->procs.open_device...
163,875,981,797,552,940,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-15652
Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of ...
https://nvd.nist.gov/vuln/detail/CVE-2017-15652
20,342
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static int FAST_FUNC config_file_action(const char *filename, struct stat *statbuf UNUSED_PARAM, void *userdata UNUSED_PARAM, int depth UNUSED_PARAM) { char *tokens[3]; parser_t *p; struct module_entry *m; int rc = TRUE; if (bb_basename(filename)[0] == '.') goto error; p = config_open2(filename...
199,132,573,803,420,930,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,343
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static int do_modprobe(struct module_entry *m) { int rc, first; if (!(m->flags & MODULE_FLAG_FOUND_IN_MODDEP)) { if (!(option_mask32 & INSMOD_OPT_SILENT)) bb_error_msg("module %s not found in modules.dep", humanly_readable_name(m)); return -ENOENT; } DBG("do_modprob'ing %s", m->modname); if (!(option_...
329,215,442,954,705,600,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,344
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static char *gather_options_str(char *opts, const char *append) { /* Speed-optimized. We call gather_options_str many times. */ if (append) { if (opts == NULL) { opts = xstrdup(append); } else { int optlen = strlen(opts); opts = xrealloc(opts, optlen + strlen(append) + 2); sprintf(opts + optlen, " %s"...
277,617,568,435,831,960,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,345
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static ALWAYS_INLINE struct module_entry *get_modentry(const char *module) { return helper_get_module(module, 0); }
21,305,470,303,375,587,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,346
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static struct module_entry *helper_get_module(const char *module, int create) { char modname[MODULE_NAME_LEN]; struct module_entry *e; llist_t *l; unsigned i; unsigned hash; filename2modname(module, modname); hash = 0; for (i = 0; modname[i]; i++) hash = ((hash << 5) + hash) + modname[i]; hash %= DB_HASH_S...
222,843,290,787,247,600,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,347
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static const char *humanly_readable_name(struct module_entry *m) { /* probed_name may be NULL. modname always exists. */ return m->probed_name ? m->probed_name : m->modname; }
130,415,178,918,175,200,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,348
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
int modprobe_main(int argc UNUSED_PARAM, char **argv) { int rc; unsigned opt; struct module_entry *me; INIT_G(); IF_LONG_OPTS(applet_long_options = modprobe_longopts;) opt_complementary = MODPROBE_COMPLEMENTARY; opt = getopt32(argv, INSMOD_OPTS MODPROBE_OPTS INSMOD_ARGS); argv += optind; /* Goto modules loc...
178,368,672,196,432,370,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,349
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static char *parse_and_add_kcmdline_module_options(char *options, const char *modulename) { char *kcmdline_buf; char *kcmdline; char *kptr; int len; kcmdline_buf = xmalloc_open_read_close("/proc/cmdline", NULL); if (!kcmdline_buf) return options; kcmdline = kcmdline_buf; len = strlen(modulename); while ((k...
80,997,853,772,543,830,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,350
busybox
4e314faa0aecb66717418e9a47a4451aec59262b
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
modprobe,rmmod: reject module names with slashes function old new delta add_probe 86 113 +27 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static int read_config(const char *path) { return recursive_action(path, ACTION_RECURSE | ACTION_QUIET, config_file_action, NULL, NULL, 1); }
199,489,453,367,821,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9645
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
https://nvd.nist.gov/vuln/detail/CVE-2014-9645
20,615
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueAddFPE (CataloguePtr cat, FontPathElementPtr fpe) { FontPathElementPtr *new; if (cat->fpeCount >= cat->fpeAlloc) { if (cat->fpeAlloc == 0) cat->fpeAlloc = 16; else cat->fpeAlloc *= 2; new = xrealloc(cat->fpeList, cat->fpeAlloc * sizeof(FontPathElementPtr)); if (new == NULL...
271,728,422,795,309,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,616
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueCloseFont (FontPathElementPtr fpe, FontPtr pFont) { /* Note: this gets called with the actual subfpe where we found * the font, not the catalogue fpe. */ FontFileCloseFont(fpe, pFont); }
161,657,589,112,647,020,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,617
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueFreeFPE (FontPathElementPtr fpe) { CataloguePtr cat = fpe->private; /* If the catalogue is modified while the xserver has fonts open * from the previous subfpes, we'll unref the old subfpes when we * reload the catalogue, and the xserver will the call FreeFPE on * them once it drops its...
100,284,049,976,816,470,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,618
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueInitFPE (FontPathElementPtr fpe) { CataloguePtr cat; cat = (CataloguePtr) xalloc(sizeof *cat); if (cat == NULL) return AllocError; fpe->private = (pointer) cat; cat->fpeCount = 0; cat->fpeAlloc = 0; cat->fpeList = NULL; cat->mtime = 0; return CatalogueRescan (fpe); }
29,400,181,580,676,856,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,619
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueListFonts (pointer client, FontPathElementPtr fpe, char *pat, int len, int max, FontNamesPtr names) { CataloguePtr cat = fpe->private; FontPathElementPtr subfpe; FontDirectoryPtr dir; int i; CatalogueRescan (fpe); for (i = 0; i < cat->fpeCount; i++) { subfpe = cat->fpeList...
225,401,443,172,087,030,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,620
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueListNextFontOrAlias(pointer client, FontPathElementPtr fpe, char **namep, int *namelenp, char **resolvedp, int *resolvedlenp, pointer private) { LFWIDataPtr data = private; CataloguePtr cat = fpe->private; int ret; if (data->current == cat->fpeCount) { xfree(data); re...
178,549,889,640,129,730,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,621
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueListNextFontWithInfo(pointer client, FontPathElementPtr fpe, char **namep, int *namelenp, FontInfoPtr *pFontInfo, int *numFonts, pointer private) { LFWIDataPtr data = private; CataloguePtr cat = fpe->private; int ret; if (data->current == cat->fpeCount) { x...
204,320,710,963,123,320,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,622
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueNameCheck (char *name) { return strncmp(name, CataloguePrefix, sizeof(CataloguePrefix) - 1) == 0; }
338,840,230,218,477,370,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,623
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueOpenFont (pointer client, FontPathElementPtr fpe, Mask flags, char *name, int namelen, fsBitmapFormat format, fsBitmapFormatMask fmask, XID id, FontPtr *pFont, char **aliasName, FontPtr non_cachable_font) { CataloguePtr cat = fpe->private; FontPathElementPtr subfpe; FontDirec...
305,486,762,307,302,550,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,624
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueRegisterLocalFpeFunctions (void) { RegisterFPEFunctions(CatalogueNameCheck, CatalogueInitFPE, CatalogueFreeFPE, CatalogueResetFPE, CatalogueOpenFont, CatalogueCloseFont, CatalogueListFonts, CatalogueStartListFontsWithInfo, CatalogueListNextFontWithInfo, NULL, NULL, ...
43,220,757,373,314,110,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,625
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueResetFPE (FontPathElementPtr fpe) { /* Always just tell the caller to close and re-open */ return FPEResetFailed; }
168,881,531,950,203,260,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,626
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueStartListFonts(pointer client, FontPathElementPtr fpe, char *pat, int len, int max, pointer *privatep, int mark_aliases) { CataloguePtr cat = fpe->private; LFWIDataPtr data; int ret, i, j; CatalogueRescan (fpe); data = (LFWIDataPtr) xalloc (sizeof *data + sizeof data->priva...
281,316,063,996,901,770,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,627
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueStartListFontsAndAliases(pointer client, FontPathElementPtr fpe, char *pat, int len, int max, pointer *privatep) { return CatalogueStartListFonts(client, fpe, pat, len, max, privatep, 1); }
227,109,308,883,839,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,628
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueStartListFontsWithInfo(pointer client, FontPathElementPtr fpe, char *pat, int len, int max, pointer *privatep) { return CatalogueStartListFonts(client, fpe, pat, len, max, privatep, 0); }
61,779,440,841,123,010,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,629
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
CatalogueUnrefFPEs (FontPathElementPtr fpe) { CataloguePtr cat = fpe->private; FontPathElementPtr subfpe; int i; for (i = 0; i < cat->fpeCount; i++) { subfpe = cat->fpeList[i]; subfpe->refcount--; if (subfpe->refcount == 0) { FontFileFreeFPE (subfpe); xfree(subfpe->name); xfree...
327,264,920,085,896,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,630
libxfont
5bf703700ee4a5d6eae20da07cb7a29369667aef
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef
None
0
ComparePriority(const void *p1, const void *p2) { FontDirectoryPtr dir1 = (*(FontPathElementPtr*) p1)->private; FontDirectoryPtr dir2 = (*(FontPathElementPtr*) p2)->private; const char *pri1 = NULL; const char *pri2 = NULL; if (dir1->attributes != NULL) pri1 = strstr(dir1->attributes, PriorityAttr...
274,288,200,556,233,130,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
20,631
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap10_char_index( TT_CMap cmap, FT_UInt32 char_code ) { FT_Byte* table = cmap->data; FT_UInt result = 0; FT_Byte* p = table + 12; FT_UInt32 start = TT_NEXT_ULONG( p ); FT_UInt32 count = TT_NEXT_ULONG( p ); FT_UInt32 idx; if ( char_code ...
170,404,942,789,752,930,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,632
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap12_char_map_binary( TT_CMap cmap, FT_UInt32* pchar_code, FT_Bool next ) { FT_UInt gindex = 0; FT_Byte* p = cmap->data + 12; FT_UInt32 num_groups = TT_PEEK_ULONG( p ); FT_UInt32 char_code = *pchar_code; ...
187,665,313,941,870,700,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,633
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap12_char_next( TT_CMap cmap, FT_UInt32 *pchar_code ) { TT_CMap12 cmap12 = (TT_CMap12)cmap; FT_UInt gindex; /* no need to search */ if ( cmap12->valid && cmap12->cur_charcode == *pchar_code ) { tt_cmap12_next( cmap12 ); if ( cmap12->valid ) ...
298,747,787,394,938,650,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,634
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap12_next( TT_CMap12 cmap ) { FT_Face face = cmap->cmap.cmap.charmap.face; FT_Byte* p; FT_ULong start, end, start_id, char_code; FT_ULong n; FT_UInt gindex; if ( cmap->cur_charcode >= 0xFFFFFFFFUL ) goto Fail; char_code = cmap->cur_charcode + 1; for ( n = cmap-...
303,388,224,214,662,480,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,635
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap13_char_next( TT_CMap cmap, FT_UInt32 *pchar_code ) { TT_CMap13 cmap13 = (TT_CMap13)cmap; FT_UInt gindex; /* no need to search */ if ( cmap13->valid && cmap13->cur_charcode == *pchar_code ) { tt_cmap13_next( cmap13 ); if ( cmap13->valid ) ...
114,085,831,956,863,870,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,636
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap2_char_index( TT_CMap cmap, FT_UInt32 char_code ) { FT_Byte* table = cmap->data; FT_UInt result = 0; FT_Byte* subheader; subheader = tt_cmap2_get_subheader( table, char_code ); if ( subheader ) { FT_Byte* p = subheader; FT_UInt idx ...
83,713,545,654,693,720,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,637
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap2_char_next( TT_CMap cmap, FT_UInt32 *pcharcode ) { FT_Byte* table = cmap->data; FT_UInt gindex = 0; FT_UInt32 result = 0; FT_UInt32 charcode = *pcharcode + 1; FT_Byte* subheader; while ( charcode < 0x10000UL ) { subheader = tt_cm...
295,330,888,762,126,240,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,638
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap2_get_subheader( FT_Byte* table, FT_UInt32 char_code ) { FT_Byte* result = NULL; if ( char_code < 0x10000UL ) { FT_UInt char_lo = (FT_UInt)( char_code & 0xFF ); FT_UInt char_hi = (FT_UInt)( char_code >> 8 ); FT_Byte* p = table + 6; /...
192,872,910,359,604,040,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,639
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap2_validate( FT_Byte* table, FT_Validator valid ) { FT_Byte* p; FT_UInt length; FT_UInt n, max_subs; FT_Byte* keys; /* keys table */ FT_Byte* subs; /* sub-headers */ FT_Byte* glyph_ids; /* glyph ID array */ if ( table + 2...
199,374,843,554,408,430,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,640
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap4_char_map_binary( TT_CMap cmap, FT_UInt32* pcharcode, FT_Bool next ) { FT_UInt num_segs2, start, end, offset; FT_Int delta; FT_UInt max, min, mid, num_segs; FT_UInt charcode = (FT_UInt)*pcharcode; FT_UInt gindex ...
281,480,157,461,273,360,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,641
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap4_char_map_linear( TT_CMap cmap, FT_UInt32* pcharcode, FT_Bool next ) { TT_Face face = (TT_Face)cmap->cmap.charmap.face; FT_Byte* limit = face->cmap_table + face->cmap_size; FT_UInt num_segs2, start, end, offset; FT_Int...
9,754,491,356,526,596,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,642
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap4_validate( FT_Byte* table, FT_Validator valid ) { FT_Byte* p; FT_UInt length; FT_Byte *ends, *starts, *offsets, *deltas, *glyph_ids; FT_UInt num_segs; FT_Error error = FT_Err_Ok; if ( table + 2 + 2 > valid->limit ) FT_INVALID_TOO_SHORT; ...
6,620,878,541,308,412,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,643
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap6_char_next( TT_CMap cmap, FT_UInt32 *pchar_code ) { FT_Byte* table = cmap->data; FT_UInt32 result = 0; FT_UInt32 char_code = *pchar_code + 1; FT_UInt gindex = 0; FT_Byte* p = table + 6; FT_UInt start = TT_NEXT_USHORT( p );...
139,719,912,894,263,760,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,644
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap8_char_index( TT_CMap cmap, FT_UInt32 char_code ) { FT_Byte* table = cmap->data; FT_UInt result = 0; FT_Byte* p = table + 8204; FT_UInt32 num_groups = TT_NEXT_ULONG( p ); FT_UInt32 start, end, start_id; for ( ; num_groups > 0; nu...
77,419,138,012,370,560,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,645
savannah
57cbb8c148999ba8f14ed53435fc071ac9953afd
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
None
0
tt_cmap8_char_next( TT_CMap cmap, FT_UInt32 *pchar_code ) { FT_Face face = cmap->cmap.charmap.face; FT_UInt32 result = 0; FT_UInt32 char_code; FT_UInt gindex = 0; FT_Byte* table = cmap->data; FT_Byte* p = table + 8204; FT...
308,758,714,886,836,340,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
https://nvd.nist.gov/vuln/detail/CVE-2015-9383
20,646
savannah
db5a4a9ae7b0048f033361744421da8569642f73
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
None
0
ps_parser_load_field( PS_Parser parser, const T1_Field field, void** objects, FT_UInt max_objects, FT_ULong* pflags ) { T1_TokenRec token; FT_Byte* cur; FT_Byte* limi...
256,311,969,578,457,500,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9382
FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
https://nvd.nist.gov/vuln/detail/CVE-2015-9382
20,648
savannah
e3058617f384cb6709f3878f753fa17aca9e3a30
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30
None
0
T1_New_Parser( T1_Parser parser, FT_Stream stream, FT_Memory memory, PSAux_Service psaux ) { FT_Error error; FT_UShort tag; FT_ULong size; psaux->ps_parser_funcs->init( &parser->root, NULL, NULL, memory ); parser->stream ...
178,683,144,954,271,250,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9290
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
https://nvd.nist.gov/vuln/detail/CVE-2015-9290
20,649
savannah
e3058617f384cb6709f3878f753fa17aca9e3a30
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30
None
0
check_type1_format( FT_Stream stream, const char* header_string, size_t header_length ) { FT_Error error; FT_UShort tag; FT_ULong dummy; if ( FT_STREAM_SEEK( 0 ) ) goto Exit; error = read_pfb_tag( stream, &tag, &dummy ); if ...
131,563,400,754,314,200,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9290
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
https://nvd.nist.gov/vuln/detail/CVE-2015-9290
20,650
savannah
e3058617f384cb6709f3878f753fa17aca9e3a30
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30
None
0
read_pfb_tag( FT_Stream stream, FT_UShort *atag, FT_ULong *asize ) { FT_Error error; FT_UShort tag; FT_ULong size; *atag = 0; *asize = 0; if ( !FT_READ_USHORT( tag ) ) { if ( tag == 0x8001U || tag == 0x8002U ) { if ( !FT_R...
42,825,135,411,619,690,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2015-9290
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
https://nvd.nist.gov/vuln/detail/CVE-2015-9290
20,651
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
_eXosip_is_public_address (const char *c_address) { return (0 != strncmp (c_address, "192.168", 7) && 0 != strncmp (c_address, "10.", 3) && 0 != strncmp (c_address, "172.16.", 7) && 0 != strncmp (c_address, "172.17.", 7) && 0 != strncmp (c_address, "172.18.", 7) && 0 ...
55,260,746,289,376,380,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,652
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_enable_ipv6 (int _ipv6_enable) { /* obsolete, use: eXosip_set_option(excontext, EXOSIP_OPT_ENABLE_IPV6, &val); */ }
281,635,655,980,386,230,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,653
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_find_free_port (struct eXosip_t *excontext, int free_port, int transport) { int res1; int res2; struct addrinfo *addrinfo_rtp = NULL; struct addrinfo *curinfo_rtp; struct addrinfo *addrinfo_rtcp = NULL; struct addrinfo *curinfo_rtcp; int sock; int count; for (count = 0; count < 8; count++) { ...
48,762,196,985,866,970,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,654
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_get_version (void) { return EXOSIP_VERSION; }
234,245,646,519,618,850,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,655
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_guess_localip (struct eXosip_t *excontext, int family, char *address, int size) { return _eXosip_guess_ip_for_via (excontext, family, address, size); }
57,939,221,485,419,900,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375