CVE-2016-2195

Integer overflow in the PointGFp constructor in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to overwrite memory and possibly execute arbitrary code via a crafted ECC point, which triggers a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:botan_project:botan:*:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.0:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.2:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.3:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.4:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.5:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.6:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.7:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.8:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.9:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.10:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.11:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.12:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.13:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.14:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.15:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.16:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.17:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.18:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.19:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.20:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.21:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.22:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.23:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.24:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.25:*:*:*:*:*:*:*
cpe:2.3:a:botan_project:botan:1.11.26:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://botan.randombit.net/security.html - Vendor Advisory () http://botan.randombit.net/security.html - Vendor Advisory
References () http://marc.info/?l=botan-devel&m=145435148602911&w=2 - Vendor Advisory () http://marc.info/?l=botan-devel&m=145435148602911&w=2 - Vendor Advisory
References () http://www.debian.org/security/2016/dsa-3565 - () http://www.debian.org/security/2016/dsa-3565 -
References () https://security.gentoo.org/glsa/201612-38 - () https://security.gentoo.org/glsa/201612-38 -

Information

Published : 2016-05-13 14:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2195

Mitre link : CVE-2016-2195

CVE.ORG link : CVE-2016-2195


JSON object : View

Products Affected

botan_project

  • botan

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer