Integer overflow in the PointGFp constructor in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to overwrite memory and possibly execute arbitrary code via a crafted ECC point, which triggers a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://botan.randombit.net/security.html - Vendor Advisory | |
References | () http://marc.info/?l=botan-devel&m=145435148602911&w=2 - Vendor Advisory | |
References | () http://www.debian.org/security/2016/dsa-3565 - | |
References | () https://security.gentoo.org/glsa/201612-38 - |
Information
Published : 2016-05-13 14:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2195
Mitre link : CVE-2016-2195
CVE.ORG link : CVE-2016-2195
JSON object : View
Products Affected
botan_project
- botan
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer