CVE-2016-4021

The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:pgpdump_project:pgpdump:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:51

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html -
References () http://seclists.org/bugtraq/2016/Apr/99 - Exploit () http://seclists.org/bugtraq/2016/Apr/99 - Exploit
References () https://github.com/kazu-yamamoto/pgpdump/pull/16 - () https://github.com/kazu-yamamoto/pgpdump/pull/16 -
References () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt - Exploit () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt - Exploit

Information

Published : 2016-05-26 14:59

Updated : 2024-11-21 02:51


NVD link : CVE-2016-4021

Mitre link : CVE-2016-4021

CVE.ORG link : CVE-2016-4021


JSON object : View

Products Affected

pgpdump_project

  • pgpdump

fedoraproject

  • fedora
CWE
CWE-399

Resource Management Errors