The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
References
Configurations
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html - | |
References | () http://seclists.org/bugtraq/2016/Apr/99 - Exploit | |
References | () https://github.com/kazu-yamamoto/pgpdump/pull/16 - | |
References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt - Exploit |
Information
Published : 2016-05-26 14:59
Updated : 2024-11-21 02:51
NVD link : CVE-2016-4021
Mitre link : CVE-2016-4021
CVE.ORG link : CVE-2016-4021
JSON object : View
Products Affected
pgpdump_project
- pgpdump
fedoraproject
- fedora
CWE
CWE-399
Resource Management Errors