idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
19,671 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg)
{
struct option_set **opt_list = arg;
char *opt, *val;
char *str;
const struct dhcp_optflag *optflag;
struct dhcp_optflag bin_optflag;
unsigned optcode;
int retval, length;
/* IP_PAIR needs 8 bytes, STATIC_ROUTES needs 9 max */
char buffer[9] ALI... | 149,849,648,500,017,060,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,672 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static int bcast_or_ucast(struct dhcp_packet *packet, uint32_t ciaddr, uint32_t server)
{
if (server)
return udhcp_send_kernel_packet(packet,
ciaddr, CLIENT_PORT,
server, SERVER_PORT);
return raw_bcast_from_client_config_ifindex(packet);
}
| 29,841,460,842,378,537,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,673 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static void change_listen_mode(int new_mode)
{
log1("Entering listen mode: %s",
new_mode != LISTEN_NONE
? (new_mode == LISTEN_KERNEL ? "kernel" : "raw")
: "none"
);
listen_mode = new_mode;
if (sockfd >= 0) {
close(sockfd);
sockfd = -1;
}
if (new_mode == LISTEN_KERNEL)
sockfd = udhcp_listen_socket(/... | 267,963,825,904,243,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,674 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static char **fill_envp(struct dhcp_packet *packet)
{
int envc;
int i;
char **envp, **curr;
const char *opt_name;
uint8_t *temp;
uint8_t overload = 0;
#define BITMAP unsigned
#define BBITS (sizeof(BITMAP) * 8)
#define BMASK(i) (1 << (i & (sizeof(BITMAP) * 8 - 1)))
#define FOUND_OPTS(i) (found_opts[(unsigned)i / ... | 58,451,251,075,529,200,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,675 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static void perform_release(uint32_t server_addr, uint32_t requested_ip)
{
char buffer[sizeof("255.255.255.255")];
struct in_addr temp_addr;
/* send release packet */
if (state == BOUND || state == RENEWING || state == REBINDING) {
temp_addr.s_addr = server_addr;
strcpy(buffer, inet_ntoa(temp_addr));
temp_ad... | 19,772,280,544,256,742,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,676 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static void perform_renew(void)
{
bb_info_msg("Performing a DHCP renew");
switch (state) {
case BOUND:
change_listen_mode(LISTEN_KERNEL);
case RENEWING:
case REBINDING:
state = RENEW_REQUESTED;
break;
case RENEW_REQUESTED: /* impatient are we? fine, square 1 */
udhcp_run_script(NULL, "deconfig");
case RE... | 70,727,659,314,851,110,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,677 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static int raw_bcast_from_client_config_ifindex(struct dhcp_packet *packet)
{
return udhcp_send_raw_packet(packet,
/*src*/ INADDR_ANY, CLIENT_PORT,
/*dst*/ INADDR_BROADCAST, SERVER_PORT, MAC_BCAST_ADDR,
client_config.ifindex);
}
| 197,168,355,617,036,750,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,678 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static NOINLINE int send_decline(/*uint32_t xid,*/ uint32_t server, uint32_t requested)
{
struct dhcp_packet packet;
/* Fill in: op, htype, hlen, cookie, chaddr, random xid fields,
* client-id option (unless -C), message type option:
*/
init_packet(&packet, DHCPDECLINE);
#if 0
/* RFC 2131 says DHCPDECLINE's x... | 214,580,540,046,218,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,679 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static NOINLINE int send_discover(uint32_t xid, uint32_t requested)
{
struct dhcp_packet packet;
/* Fill in: op, htype, hlen, cookie, chaddr fields,
* random xid field (we override it below),
* client-id option (unless -C), message type option:
*/
init_packet(&packet, DHCPDISCOVER);
packet.xid = xid;
if (r... | 50,813,797,879,006,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,680 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static int send_release(uint32_t server, uint32_t ciaddr)
{
struct dhcp_packet packet;
/* Fill in: op, htype, hlen, cookie, chaddr, random xid fields,
* client-id option (unless -C), message type option:
*/
init_packet(&packet, DHCPRELEASE);
/* DHCPRELEASE uses ciaddr, not "requested ip", to store IP being re... | 114,214,621,899,195,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,681 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static NOINLINE int send_renew(uint32_t xid, uint32_t server, uint32_t ciaddr)
{
struct dhcp_packet packet;
/*
* RFC 2131 4.3.2 DHCPREQUEST message
* ...
* DHCPREQUEST generated during RENEWING state:
*
* 'server identifier' MUST NOT be filled in, 'requested IP address'
* option MUST NOT be filled in, 'ciaddr' ... | 187,055,013,299,257,920,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,682 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static NOINLINE int send_select(uint32_t xid, uint32_t server, uint32_t requested)
{
struct dhcp_packet packet;
struct in_addr addr;
/*
* RFC 2131 4.3.2 DHCPREQUEST message
* ...
* If the DHCPREQUEST message contains a 'server identifier'
* option, the message is in response to a DHCPOFFER message.
* Otherwise,... | 45,628,656,987,483,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,683 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static int udhcp_raw_socket(int ifindex)
{
int fd;
struct sockaddr_ll sock;
log1("Opening raw socket on ifindex %d", ifindex); //log2?
fd = xsocket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP));
/* ^^^^^
* SOCK_DGRAM: remove link-layer headers on input (SOCK_RAW keeps them)
* ETH_P_IP: want to receive only packets... | 337,920,473,045,626,330,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,684 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static NOINLINE int udhcp_recv_raw_packet(struct dhcp_packet *dhcp_pkt, int fd)
{
int bytes;
struct ip_udp_dhcp_packet packet;
uint16_t check;
unsigned char cmsgbuf[CMSG_LEN(sizeof(struct tpacket_auxdata))];
struct iovec iov;
struct msghdr msg;
struct cmsghdr *cmsg;
/* used to use just safe_read(fd, &packet, s... | 156,701,090,959,833,390,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,685 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static void udhcp_run_script(struct dhcp_packet *packet, const char *name)
{
char **envp, **curr;
char *argv[3];
envp = fill_envp(packet);
/* call script */
log1("Executing %s %s", client_config.script, name);
argv[0] = (char*) client_config.script;
argv[1] = (char*) name;
argv[2] = NULL;
spawn_and_wait(argv... | 121,066,390,491,847,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,686 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | int udhcpc_main(int argc UNUSED_PARAM, char **argv)
{
uint8_t *message;
const char *str_V, *str_h, *str_F, *str_r;
IF_FEATURE_UDHCPC_ARPING(const char *str_a = "2000";)
IF_FEATURE_UDHCP_PORT(char *str_P;)
void *clientid_mac_ptr;
llist_t *list_O = NULL;
llist_t *list_x = NULL;
int tryagain_timeout = 20;
int dis... | 287,302,697,509,222,940,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,687 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static const char *valid_domain_label(const char *label)
{
unsigned char ch;
unsigned pos = 0;
for (;;) {
ch = *label;
if ((ch|0x20) < 'a' || (ch|0x20) > 'z') {
if (ch < '0' || ch > '9') {
if (ch == '\0' || ch == '.')
return label;
/* DNS allows only '-', but we are more permissive */
if (ch... | 34,438,665,356,107,934,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
19,734 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | freelist_extract(SSL_CTX *ctx, int for_read, int sz)
{
SSL3_BUF_FREELIST *list;
SSL3_BUF_FREELIST_ENTRY *ent = NULL;
void *result = NULL;
CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX);
list = for_read ? ctx->rbuf_freelist : ctx->wbuf_freelist;
if (list != NULL && sz == (int)list->chunklen)
ent = list->head;
if (ent != ... | 1,375,934,267,163,180,600,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,735 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | freelist_insert(SSL_CTX *ctx, int for_read, size_t sz, void *mem)
{
SSL3_BUF_FREELIST *list;
SSL3_BUF_FREELIST_ENTRY *ent;
CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX);
list = for_read ? ctx->rbuf_freelist : ctx->wbuf_freelist;
if (list != NULL &&
(sz == list->chunklen || list->chunklen == 0) &&
list->len < ctx-... | 127,513,747,772,195,870,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,736 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | static int ssl3_add_cert_to_buf(BUF_MEM *buf, unsigned long *l, X509 *x)
{
int n;
unsigned char *p;
n=i2d_X509(x,NULL);
if (!BUF_MEM_grow_clean(buf,(int)(n+(*l)+3)))
{
SSLerr(SSL_F_SSL3_ADD_CERT_TO_BUF,ERR_R_BUF_LIB);
return(-1);
}
p=(unsigned char *)&(buf->data[*l]);
l2n3(n,p);
i2d_X509(x,&p);
*l+=n+... | 84,786,508,903,028,350,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,737 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_do_write(SSL *s, int type)
{
int ret;
ret=ssl3_write_bytes(s,type,&s->init_buf->data[s->init_off],
s->init_num);
if (ret < 0) return(-1);
if (type == SSL3_RT_HANDSHAKE)
/* should not be done for 'Hello Request's, but in that case
* we'll ignore the result anyway */
ssl3_finis... | 29,185,335,887,412,360,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,738 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_get_finished(SSL *s, int a, int b)
{
int al,i,ok;
long n;
unsigned char *p;
#ifdef OPENSSL_NO_NEXTPROTONEG
/* the mac has already been generated when we received the
* change cipher spec message and is in s->s3->tmp.peer_finish_md.
*/
#endif
n=s->method->ssl_get_message(s,
a,
b,
SSL3_MT_FINI... | 327,550,506,739,184,460,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,739 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | long ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok)
{
unsigned char *p;
unsigned long l;
long n;
int i,al;
if (s->s3->tmp.reuse_message)
{
s->s3->tmp.reuse_message=0;
if ((mt >= 0) && (s->s3->tmp.message_type != mt))
{
al=SSL_AD_UNEXPECTED_MESSAGE;
SSLerr(SSL_F_SSL3_GET_MESS... | 287,281,681,343,785,950,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,740 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | unsigned long ssl3_output_cert_chain(SSL *s, X509 *x)
{
unsigned char *p;
int i;
unsigned long l=7;
BUF_MEM *buf;
int no_chain;
if ((s->mode & SSL_MODE_NO_AUTO_CHAIN) || s->ctx->extra_certs)
no_chain = 1;
else
no_chain = 0;
/* TLSv1 sends a chain with nothing in it, instead of an alert */
buf=s->init_bu... | 82,440,598,178,479,180,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,741 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_release_read_buffer(SSL *s)
{
if (s->s3->rbuf.buf != NULL)
{
freelist_insert(s->ctx, 1, s->s3->rbuf.len, s->s3->rbuf.buf);
s->s3->rbuf.buf = NULL;
}
return 1;
}
| 10,369,202,032,656,852,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,742 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_release_write_buffer(SSL *s)
{
if (s->s3->wbuf.buf != NULL)
{
freelist_insert(s->ctx, 0, s->s3->wbuf.len, s->s3->wbuf.buf);
s->s3->wbuf.buf = NULL;
}
return 1;
}
| 113,264,079,542,241,360,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,743 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_send_change_cipher_spec(SSL *s, int a, int b)
{
unsigned char *p;
if (s->state == a)
{
p=(unsigned char *)s->init_buf->data;
*p=SSL3_MT_CCS;
s->init_num=1;
s->init_off=0;
s->state=b;
}
/* SSL3_ST_CW_CHANGE_B */
return(ssl3_do_write(s,SSL3_RT_CHANGE_CIPHER_SPEC));
}
| 227,891,557,872,265,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,744 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen)
{
unsigned char *p,*d;
int i;
unsigned long l;
if (s->state == a)
{
d=(unsigned char *)s->init_buf->data;
p= &(d[4]);
i=s->method->ssl3_enc->final_finish_mac(s,
sender,slen,s->s3->tmp.finish_md);
if (i == 0)
return 0;
s-... | 225,292,644,812,825,800,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,745 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_setup_buffers(SSL *s)
{
if (!ssl3_setup_read_buffer(s))
return 0;
if (!ssl3_setup_write_buffer(s))
return 0;
return 1;
}
| 160,397,453,056,800,970,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,746 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_setup_read_buffer(SSL *s)
{
unsigned char *p;
size_t len,align=0,headerlen;
if (SSL_version(s) == DTLS1_VERSION || SSL_version(s) == DTLS1_BAD_VER)
headerlen = DTLS1_RT_HEADER_LENGTH;
else
headerlen = SSL3_RT_HEADER_LENGTH;
#if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0
align = (-SSL3_RT... | 194,411,132,765,286,630,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,747 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl3_setup_write_buffer(SSL *s)
{
unsigned char *p;
size_t len,align=0,headerlen;
if (SSL_version(s) == DTLS1_VERSION || SSL_version(s) == DTLS1_BAD_VER)
headerlen = DTLS1_RT_HEADER_LENGTH + 1;
else
headerlen = SSL3_RT_HEADER_LENGTH;
#if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0
align = (-SSL... | 332,241,519,517,923,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,748 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl_cert_type(X509 *x, EVP_PKEY *pkey)
{
EVP_PKEY *pk;
int ret= -1,i;
if (pkey == NULL)
pk=X509_get_pubkey(x);
else
pk=pkey;
if (pk == NULL) goto err;
i=pk->type;
if (i == EVP_PKEY_RSA)
{
ret=SSL_PKEY_RSA_ENC;
}
else if (i == EVP_PKEY_DSA)
{
ret=SSL_PKEY_DSA_SIGN;
}
#ifndef OPENSSL_NO_EC
... | 255,573,037,574,161,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,749 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 0 | int ssl_verify_alarm_type(long type)
{
int al;
switch(type)
{
case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
case X509_V_ERR_UNABLE_TO_GET_CRL:
case X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER:
al=SSL_AD_UNKNOWN_CA;
break;
case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE:
case X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNAT... | 16,460,406,983,852,432,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
19,750 | samba | b9b9f6738fba5c32e87cb9c36b358355b444fb9b | https://github.com/samba-team/samba | https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b | None | 0 | static void ctdb_listen_event(struct event_context *ev, struct fd_event *fde,
uint16_t flags, void *private_data)
{
struct ctdb_context *ctdb = talloc_get_type(private_data, struct ctdb_context);
struct ctdb_tcp *ctcp = talloc_get_type(ctdb->private_data, struct ctdb_tcp);
ctdb_sock_addr addr;
socklen_t l... | 327,804,877,601,242,160,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4159 | ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h. | https://nvd.nist.gov/vuln/detail/CVE-2013-4159 |
19,751 | samba | b9b9f6738fba5c32e87cb9c36b358355b444fb9b | https://github.com/samba-team/samba | https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b | None | 0 | static int ctdb_tcp_get_address(struct ctdb_context *ctdb,
const char *address, ctdb_sock_addr *addr)
{
if (parse_ip(address, NULL, 0, addr) == 0) {
DEBUG(DEBUG_CRIT, (__location__ " Unparsable address : %s.\n", address));
return -1;
}
return 0;
}
| 155,247,141,320,325,590,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4159 | ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h. | https://nvd.nist.gov/vuln/detail/CVE-2013-4159 |
19,752 | samba | b9b9f6738fba5c32e87cb9c36b358355b444fb9b | https://github.com/samba-team/samba | https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b | None | 0 | void ctdb_tcp_node_connect(struct event_context *ev, struct timed_event *te,
struct timeval t, void *private_data)
{
struct ctdb_node *node = talloc_get_type(private_data,
struct ctdb_node);
struct ctdb_tcp_node *tnode = talloc_get_type(node->private_data,
struct ctdb_tcp_node);
struct ctd... | 129,140,139,532,072,020,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4159 | ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h. | https://nvd.nist.gov/vuln/detail/CVE-2013-4159 |
19,753 | samba | b9b9f6738fba5c32e87cb9c36b358355b444fb9b | https://github.com/samba-team/samba | https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b | None | 0 | void ctdb_tcp_stop_connection(struct ctdb_node *node)
{
struct ctdb_tcp_node *tnode = talloc_get_type(
node->private_data, struct ctdb_tcp_node);
ctdb_queue_set_fd(tnode->out_queue, -1);
talloc_free(tnode->connect_te);
talloc_free(tnode->connect_fde);
tnode->connect_fde = NULL;
tnode->connect_te = NULL;
if (... | 277,742,162,711,226,000,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4159 | ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h. | https://nvd.nist.gov/vuln/detail/CVE-2013-4159 |
19,754 | samba | b9b9f6738fba5c32e87cb9c36b358355b444fb9b | https://github.com/samba-team/samba | https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b | None | 0 | void ctdb_tcp_tnode_cb(uint8_t *data, size_t cnt, void *private_data)
{
struct ctdb_node *node = talloc_get_type(private_data, struct ctdb_node);
struct ctdb_tcp_node *tnode = talloc_get_type(
node->private_data, struct ctdb_tcp_node);
if (data == NULL) {
node->ctdb->upcalls->node_dead(node);
}
ctdb_tcp_stop... | 233,886,914,467,096,000,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4159 | ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h. | https://nvd.nist.gov/vuln/detail/CVE-2013-4159 |
19,762 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_add_device_list(char **device_list[], const char *drive,
unsigned int *num_drives)
{
if (NULL != drive) {
unsigned int j;
char real_device_1[PATH_MAX];
char real_device_2[PATH_MAX];
cdio_realpath(drive, real_device_1);
/* Check if drive is already in list. */
for (j=0... | 66,281,449,054,252,070,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,763 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_generic_free (void *p_user_data)
{
generic_img_private_t *p_env = p_user_data;
if (NULL == p_env) return;
if (p_env->source_name) free (p_env->source_name);
if (NULL != p_env->cdtext) {
cdtext_destroy(p_env->cdtext);
p_env->cdtext = NULL;
}
if (p_env->fd >= 0)
close (p_env->fd);
i... | 146,540,803,098,402,280,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,764 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_generic_init (void *user_data, int open_flags)
{
generic_img_private_t *p_env = user_data;
if (p_env->init) {
cdio_warn ("init called more than once");
return false;
}
p_env->fd = open (p_env->source_name, open_flags, 0);
if (p_env->fd < 0)
{
cdio_warn ("open (%s): %s", p_env->source_... | 47,952,435,505,707,970,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,765 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_generic_lseek (void *user_data, off_t offset, int whence)
{
generic_img_private_t *p_env = user_data;
return CDIO_LSEEK(p_env->fd, offset, whence);
}
| 195,776,600,009,891,030,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,766 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_generic_read_form1_sector (void * user_data, void *data, lsn_t lsn)
{
if (0 > cdio_generic_lseek(user_data, CDIO_CD_FRAMESIZE*lsn, SEEK_SET))
return DRIVER_OP_ERROR;
return cdio_generic_read(user_data, data, CDIO_CD_FRAMESIZE);
}
| 89,141,096,061,379,850,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,767 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_generic_stdio_free (void *p_user_data)
{
generic_img_private_t *p_env = p_user_data;
if (NULL == p_env) return;
if (NULL != p_env->source_name)
free (p_env->source_name);
if (p_env->data_source)
cdio_stdio_destroy (p_env->data_source);
}
| 180,865,783,870,359,820,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,768 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_generic_unimplemented_set_blocksize (void *p_user_data,
uint16_t i_blocksize) {
/* Sort of a stub here. Perhaps log a message? */
return DRIVER_OP_UNSUPPORTED;
}
| 104,161,478,862,733,670,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,769 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_generic_unimplemented_set_speed (void *p_user_data, int i_speed) {
/* Sort of a stub here. Perhaps log a message? */
return DRIVER_OP_UNSUPPORTED;
}
| 110,780,735,827,002,270,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,770 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_is_device_generic(const char *source_name)
{
struct stat buf;
if (0 != stat(source_name, &buf)) {
cdio_warn ("Can't get file status for %s:\n%s", source_name,
strerror(errno));
return false;
}
return (S_ISBLK(buf.st_mode) || S_ISCHR(buf.st_mode));
}
| 284,306,616,062,436,550,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
19,771 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 0 | cdio_is_device_quiet_generic(const char *source_name)
{
struct stat buf;
if (0 != stat(source_name, &buf)) {
return false;
}
return (S_ISBLK(buf.st_mode) || S_ISCHR(buf.st_mode));
}
| 234,148,506,711,485,450,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
20,292 | ghostscript | 2fc463d0efbd044a8232611f0898eeb12b72a970 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2fc463d0e | None | 0 | lib_file_open_search_with_combine(gs_file_path_ptr lib_path, const gs_memory_t *mem, i_ctx_t *i_ctx_p,
const char *fname, uint flen, char *buffer, int blen, uint *pclen, ref *pfile,
gx_io_device *iodev, bool starting_arg_file, char *fmode)
{
strea... | 313,670,445,063,028,940,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-15652 | Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of ... | https://nvd.nist.gov/vuln/detail/CVE-2017-15652 |
20,293 | ghostscript | 2fc463d0efbd044a8232611f0898eeb12b72a970 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2fc463d0e | None | 0 | lib_file_open_search_with_no_combine(gs_file_path_ptr lib_path, const gs_memory_t *mem, i_ctx_t *i_ctx_p,
const char *fname, uint flen, char *buffer, int blen, uint *pclen, ref *pfile,
gx_io_device *iodev, bool starting_arg_file, char *fmode)
{
... | 226,463,086,561,828,420,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-15652 | Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of ... | https://nvd.nist.gov/vuln/detail/CVE-2017-15652 |
20,294 | ghostscript | 2fc463d0efbd044a8232611f0898eeb12b72a970 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2fc463d0e | None | 0 | zopen_file(i_ctx_t *i_ctx_p, const gs_parsed_file_name_t *pfn,
const char *file_access, stream **ps, gs_memory_t *mem)
{
gx_io_device *const iodev = pfn->iodev;
int code = 0;
if (pfn->fname == NULL) { /* just a device */
iodev->state = i_ctx_p;
code = iodev->procs.open_device... | 163,875,981,797,552,940,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-15652 | Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of ... | https://nvd.nist.gov/vuln/detail/CVE-2017-15652 |
20,342 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static int FAST_FUNC config_file_action(const char *filename,
struct stat *statbuf UNUSED_PARAM,
void *userdata UNUSED_PARAM,
int depth UNUSED_PARAM)
{
char *tokens[3];
parser_t *p;
struct module_entry *m;
int rc = TRUE;
if (bb_basename(filename)[0] == '.')
goto error;
p = config_open2(filename... | 199,132,573,803,420,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,343 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static int do_modprobe(struct module_entry *m)
{
int rc, first;
if (!(m->flags & MODULE_FLAG_FOUND_IN_MODDEP)) {
if (!(option_mask32 & INSMOD_OPT_SILENT))
bb_error_msg("module %s not found in modules.dep",
humanly_readable_name(m));
return -ENOENT;
}
DBG("do_modprob'ing %s", m->modname);
if (!(option_... | 329,215,442,954,705,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,344 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static char *gather_options_str(char *opts, const char *append)
{
/* Speed-optimized. We call gather_options_str many times. */
if (append) {
if (opts == NULL) {
opts = xstrdup(append);
} else {
int optlen = strlen(opts);
opts = xrealloc(opts, optlen + strlen(append) + 2);
sprintf(opts + optlen, " %s"... | 277,617,568,435,831,960,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,345 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static ALWAYS_INLINE struct module_entry *get_modentry(const char *module)
{
return helper_get_module(module, 0);
}
| 21,305,470,303,375,587,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,346 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static struct module_entry *helper_get_module(const char *module, int create)
{
char modname[MODULE_NAME_LEN];
struct module_entry *e;
llist_t *l;
unsigned i;
unsigned hash;
filename2modname(module, modname);
hash = 0;
for (i = 0; modname[i]; i++)
hash = ((hash << 5) + hash) + modname[i];
hash %= DB_HASH_S... | 222,843,290,787,247,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,347 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static const char *humanly_readable_name(struct module_entry *m)
{
/* probed_name may be NULL. modname always exists. */
return m->probed_name ? m->probed_name : m->modname;
}
| 130,415,178,918,175,200,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,348 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | int modprobe_main(int argc UNUSED_PARAM, char **argv)
{
int rc;
unsigned opt;
struct module_entry *me;
INIT_G();
IF_LONG_OPTS(applet_long_options = modprobe_longopts;)
opt_complementary = MODPROBE_COMPLEMENTARY;
opt = getopt32(argv, INSMOD_OPTS MODPROBE_OPTS INSMOD_ARGS);
argv += optind;
/* Goto modules loc... | 178,368,672,196,432,370,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,349 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static char *parse_and_add_kcmdline_module_options(char *options, const char *modulename)
{
char *kcmdline_buf;
char *kcmdline;
char *kptr;
int len;
kcmdline_buf = xmalloc_open_read_close("/proc/cmdline", NULL);
if (!kcmdline_buf)
return options;
kcmdline = kcmdline_buf;
len = strlen(modulename);
while ((k... | 80,997,853,772,543,830,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,350 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static int read_config(const char *path)
{
return recursive_action(path, ACTION_RECURSE | ACTION_QUIET,
config_file_action, NULL, NULL, 1);
}
| 199,489,453,367,821,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
20,615 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueAddFPE (CataloguePtr cat, FontPathElementPtr fpe)
{
FontPathElementPtr *new;
if (cat->fpeCount >= cat->fpeAlloc)
{
if (cat->fpeAlloc == 0)
cat->fpeAlloc = 16;
else
cat->fpeAlloc *= 2;
new = xrealloc(cat->fpeList,
cat->fpeAlloc * sizeof(FontPathElementPtr));
if (new == NULL... | 271,728,422,795,309,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,616 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueCloseFont (FontPathElementPtr fpe, FontPtr pFont)
{
/* Note: this gets called with the actual subfpe where we found
* the font, not the catalogue fpe. */
FontFileCloseFont(fpe, pFont);
}
| 161,657,589,112,647,020,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,617 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueFreeFPE (FontPathElementPtr fpe)
{
CataloguePtr cat = fpe->private;
/* If the catalogue is modified while the xserver has fonts open
* from the previous subfpes, we'll unref the old subfpes when we
* reload the catalogue, and the xserver will the call FreeFPE on
* them once it drops its... | 100,284,049,976,816,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,618 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueInitFPE (FontPathElementPtr fpe)
{
CataloguePtr cat;
cat = (CataloguePtr) xalloc(sizeof *cat);
if (cat == NULL)
return AllocError;
fpe->private = (pointer) cat;
cat->fpeCount = 0;
cat->fpeAlloc = 0;
cat->fpeList = NULL;
cat->mtime = 0;
return CatalogueRescan (fpe);
}
| 29,400,181,580,676,856,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,619 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueListFonts (pointer client, FontPathElementPtr fpe, char *pat,
int len, int max, FontNamesPtr names)
{
CataloguePtr cat = fpe->private;
FontPathElementPtr subfpe;
FontDirectoryPtr dir;
int i;
CatalogueRescan (fpe);
for (i = 0; i < cat->fpeCount; i++)
{
subfpe = cat->fpeList... | 225,401,443,172,087,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,620 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueListNextFontOrAlias(pointer client, FontPathElementPtr fpe,
char **namep, int *namelenp, char **resolvedp,
int *resolvedlenp, pointer private)
{
LFWIDataPtr data = private;
CataloguePtr cat = fpe->private;
int ret;
if (data->current == cat->fpeCount)
{
xfree(data);
re... | 178,549,889,640,129,730,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,621 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueListNextFontWithInfo(pointer client, FontPathElementPtr fpe,
char **namep, int *namelenp,
FontInfoPtr *pFontInfo,
int *numFonts, pointer private)
{
LFWIDataPtr data = private;
CataloguePtr cat = fpe->private;
int ret;
if (data->current == cat->fpeCount)
{
x... | 204,320,710,963,123,320,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,622 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueNameCheck (char *name)
{
return strncmp(name, CataloguePrefix, sizeof(CataloguePrefix) - 1) == 0;
}
| 338,840,230,218,477,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,623 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueOpenFont (pointer client, FontPathElementPtr fpe, Mask flags,
char *name, int namelen,
fsBitmapFormat format, fsBitmapFormatMask fmask,
XID id, FontPtr *pFont, char **aliasName,
FontPtr non_cachable_font)
{
CataloguePtr cat = fpe->private;
FontPathElementPtr subfpe;
FontDirec... | 305,486,762,307,302,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,624 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueRegisterLocalFpeFunctions (void)
{
RegisterFPEFunctions(CatalogueNameCheck,
CatalogueInitFPE,
CatalogueFreeFPE,
CatalogueResetFPE,
CatalogueOpenFont,
CatalogueCloseFont,
CatalogueListFonts,
CatalogueStartListFontsWithInfo,
CatalogueListNextFontWithInfo,
NULL,
NULL,
... | 43,220,757,373,314,110,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,625 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueResetFPE (FontPathElementPtr fpe)
{
/* Always just tell the caller to close and re-open */
return FPEResetFailed;
}
| 168,881,531,950,203,260,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,626 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueStartListFonts(pointer client, FontPathElementPtr fpe,
char *pat, int len, int max, pointer *privatep,
int mark_aliases)
{
CataloguePtr cat = fpe->private;
LFWIDataPtr data;
int ret, i, j;
CatalogueRescan (fpe);
data = (LFWIDataPtr) xalloc (sizeof *data +
sizeof data->priva... | 281,316,063,996,901,770,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,627 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueStartListFontsAndAliases(pointer client, FontPathElementPtr fpe,
char *pat, int len, int max,
pointer *privatep)
{
return CatalogueStartListFonts(client, fpe, pat, len, max, privatep, 1);
}
| 227,109,308,883,839,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,628 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueStartListFontsWithInfo(pointer client, FontPathElementPtr fpe,
char *pat, int len, int max,
pointer *privatep)
{
return CatalogueStartListFonts(client, fpe, pat, len, max, privatep, 0);
}
| 61,779,440,841,123,010,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,629 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | CatalogueUnrefFPEs (FontPathElementPtr fpe)
{
CataloguePtr cat = fpe->private;
FontPathElementPtr subfpe;
int i;
for (i = 0; i < cat->fpeCount; i++)
{
subfpe = cat->fpeList[i];
subfpe->refcount--;
if (subfpe->refcount == 0)
{
FontFileFreeFPE (subfpe);
xfree(subfpe->name);
xfree... | 327,264,920,085,896,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,630 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 0 | ComparePriority(const void *p1, const void *p2)
{
FontDirectoryPtr dir1 = (*(FontPathElementPtr*) p1)->private;
FontDirectoryPtr dir2 = (*(FontPathElementPtr*) p2)->private;
const char *pri1 = NULL;
const char *pri2 = NULL;
if (dir1->attributes != NULL)
pri1 = strstr(dir1->attributes, PriorityAttr... | 274,288,200,556,233,130,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
20,631 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap10_char_index( TT_CMap cmap,
FT_UInt32 char_code )
{
FT_Byte* table = cmap->data;
FT_UInt result = 0;
FT_Byte* p = table + 12;
FT_UInt32 start = TT_NEXT_ULONG( p );
FT_UInt32 count = TT_NEXT_ULONG( p );
FT_UInt32 idx;
if ( char_code ... | 170,404,942,789,752,930,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,632 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap12_char_map_binary( TT_CMap cmap,
FT_UInt32* pchar_code,
FT_Bool next )
{
FT_UInt gindex = 0;
FT_Byte* p = cmap->data + 12;
FT_UInt32 num_groups = TT_PEEK_ULONG( p );
FT_UInt32 char_code = *pchar_code;
... | 187,665,313,941,870,700,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,633 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap12_char_next( TT_CMap cmap,
FT_UInt32 *pchar_code )
{
TT_CMap12 cmap12 = (TT_CMap12)cmap;
FT_UInt gindex;
/* no need to search */
if ( cmap12->valid && cmap12->cur_charcode == *pchar_code )
{
tt_cmap12_next( cmap12 );
if ( cmap12->valid )
... | 298,747,787,394,938,650,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,634 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap12_next( TT_CMap12 cmap )
{
FT_Face face = cmap->cmap.cmap.charmap.face;
FT_Byte* p;
FT_ULong start, end, start_id, char_code;
FT_ULong n;
FT_UInt gindex;
if ( cmap->cur_charcode >= 0xFFFFFFFFUL )
goto Fail;
char_code = cmap->cur_charcode + 1;
for ( n = cmap-... | 303,388,224,214,662,480,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,635 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap13_char_next( TT_CMap cmap,
FT_UInt32 *pchar_code )
{
TT_CMap13 cmap13 = (TT_CMap13)cmap;
FT_UInt gindex;
/* no need to search */
if ( cmap13->valid && cmap13->cur_charcode == *pchar_code )
{
tt_cmap13_next( cmap13 );
if ( cmap13->valid )
... | 114,085,831,956,863,870,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,636 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap2_char_index( TT_CMap cmap,
FT_UInt32 char_code )
{
FT_Byte* table = cmap->data;
FT_UInt result = 0;
FT_Byte* subheader;
subheader = tt_cmap2_get_subheader( table, char_code );
if ( subheader )
{
FT_Byte* p = subheader;
FT_UInt idx ... | 83,713,545,654,693,720,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,637 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap2_char_next( TT_CMap cmap,
FT_UInt32 *pcharcode )
{
FT_Byte* table = cmap->data;
FT_UInt gindex = 0;
FT_UInt32 result = 0;
FT_UInt32 charcode = *pcharcode + 1;
FT_Byte* subheader;
while ( charcode < 0x10000UL )
{
subheader = tt_cm... | 295,330,888,762,126,240,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,638 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap2_get_subheader( FT_Byte* table,
FT_UInt32 char_code )
{
FT_Byte* result = NULL;
if ( char_code < 0x10000UL )
{
FT_UInt char_lo = (FT_UInt)( char_code & 0xFF );
FT_UInt char_hi = (FT_UInt)( char_code >> 8 );
FT_Byte* p = table + 6; /... | 192,872,910,359,604,040,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,639 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap2_validate( FT_Byte* table,
FT_Validator valid )
{
FT_Byte* p;
FT_UInt length;
FT_UInt n, max_subs;
FT_Byte* keys; /* keys table */
FT_Byte* subs; /* sub-headers */
FT_Byte* glyph_ids; /* glyph ID array */
if ( table + 2... | 199,374,843,554,408,430,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,640 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap4_char_map_binary( TT_CMap cmap,
FT_UInt32* pcharcode,
FT_Bool next )
{
FT_UInt num_segs2, start, end, offset;
FT_Int delta;
FT_UInt max, min, mid, num_segs;
FT_UInt charcode = (FT_UInt)*pcharcode;
FT_UInt gindex ... | 281,480,157,461,273,360,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,641 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap4_char_map_linear( TT_CMap cmap,
FT_UInt32* pcharcode,
FT_Bool next )
{
TT_Face face = (TT_Face)cmap->cmap.charmap.face;
FT_Byte* limit = face->cmap_table + face->cmap_size;
FT_UInt num_segs2, start, end, offset;
FT_Int... | 9,754,491,356,526,596,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,642 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap4_validate( FT_Byte* table,
FT_Validator valid )
{
FT_Byte* p;
FT_UInt length;
FT_Byte *ends, *starts, *offsets, *deltas, *glyph_ids;
FT_UInt num_segs;
FT_Error error = FT_Err_Ok;
if ( table + 2 + 2 > valid->limit )
FT_INVALID_TOO_SHORT;
... | 6,620,878,541,308,412,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,643 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap6_char_next( TT_CMap cmap,
FT_UInt32 *pchar_code )
{
FT_Byte* table = cmap->data;
FT_UInt32 result = 0;
FT_UInt32 char_code = *pchar_code + 1;
FT_UInt gindex = 0;
FT_Byte* p = table + 6;
FT_UInt start = TT_NEXT_USHORT( p );... | 139,719,912,894,263,760,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,644 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap8_char_index( TT_CMap cmap,
FT_UInt32 char_code )
{
FT_Byte* table = cmap->data;
FT_UInt result = 0;
FT_Byte* p = table + 8204;
FT_UInt32 num_groups = TT_NEXT_ULONG( p );
FT_UInt32 start, end, start_id;
for ( ; num_groups > 0; nu... | 77,419,138,012,370,560,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,645 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 0 | tt_cmap8_char_next( TT_CMap cmap,
FT_UInt32 *pchar_code )
{
FT_Face face = cmap->cmap.charmap.face;
FT_UInt32 result = 0;
FT_UInt32 char_code;
FT_UInt gindex = 0;
FT_Byte* table = cmap->data;
FT_Byte* p = table + 8204;
FT... | 308,758,714,886,836,340,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
20,646 | savannah | db5a4a9ae7b0048f033361744421da8569642f73 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73 | None | 0 | ps_parser_load_field( PS_Parser parser,
const T1_Field field,
void** objects,
FT_UInt max_objects,
FT_ULong* pflags )
{
T1_TokenRec token;
FT_Byte* cur;
FT_Byte* limi... | 256,311,969,578,457,500,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9382 | FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation. | https://nvd.nist.gov/vuln/detail/CVE-2015-9382 |
20,648 | savannah | e3058617f384cb6709f3878f753fa17aca9e3a30 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30 | None | 0 | T1_New_Parser( T1_Parser parser,
FT_Stream stream,
FT_Memory memory,
PSAux_Service psaux )
{
FT_Error error;
FT_UShort tag;
FT_ULong size;
psaux->ps_parser_funcs->init( &parser->root, NULL, NULL, memory );
parser->stream ... | 178,683,144,954,271,250,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9290 | In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again. | https://nvd.nist.gov/vuln/detail/CVE-2015-9290 |
20,649 | savannah | e3058617f384cb6709f3878f753fa17aca9e3a30 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30 | None | 0 | check_type1_format( FT_Stream stream,
const char* header_string,
size_t header_length )
{
FT_Error error;
FT_UShort tag;
FT_ULong dummy;
if ( FT_STREAM_SEEK( 0 ) )
goto Exit;
error = read_pfb_tag( stream, &tag, &dummy );
if ... | 131,563,400,754,314,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9290 | In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again. | https://nvd.nist.gov/vuln/detail/CVE-2015-9290 |
20,650 | savannah | e3058617f384cb6709f3878f753fa17aca9e3a30 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30 | None | 0 | read_pfb_tag( FT_Stream stream,
FT_UShort *atag,
FT_ULong *asize )
{
FT_Error error;
FT_UShort tag;
FT_ULong size;
*atag = 0;
*asize = 0;
if ( !FT_READ_USHORT( tag ) )
{
if ( tag == 0x8001U || tag == 0x8002U )
{
if ( !FT_R... | 42,825,135,411,619,690,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9290 | In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again. | https://nvd.nist.gov/vuln/detail/CVE-2015-9290 |
20,651 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | _eXosip_is_public_address (const char *c_address)
{
return (0 != strncmp (c_address, "192.168", 7)
&& 0 != strncmp (c_address, "10.", 3)
&& 0 != strncmp (c_address, "172.16.", 7)
&& 0 != strncmp (c_address, "172.17.", 7)
&& 0 != strncmp (c_address, "172.18.", 7)
&& 0 ... | 55,260,746,289,376,380,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,652 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_enable_ipv6 (int _ipv6_enable)
{
/* obsolete, use:
eXosip_set_option(excontext, EXOSIP_OPT_ENABLE_IPV6, &val);
*/
}
| 281,635,655,980,386,230,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,653 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_find_free_port (struct eXosip_t *excontext, int free_port, int transport)
{
int res1;
int res2;
struct addrinfo *addrinfo_rtp = NULL;
struct addrinfo *curinfo_rtp;
struct addrinfo *addrinfo_rtcp = NULL;
struct addrinfo *curinfo_rtcp;
int sock;
int count;
for (count = 0; count < 8; count++) {
... | 48,762,196,985,866,970,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,654 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_get_version (void)
{
return EXOSIP_VERSION;
}
| 234,245,646,519,618,850,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,655 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_guess_localip (struct eXosip_t *excontext, int family, char *address, int size)
{
return _eXosip_guess_ip_for_via (excontext, family, address, size);
}
| 57,939,221,485,419,900,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.