Multiple integer overflows in ber-decoder.c in Libksba before 1.3.3 allow remote attackers to cause a denial of service (crash) via crafted BER data, which leads to a buffer overflow.
References
Configurations
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887 - | |
References | () http://www.openwall.com/lists/oss-security/2016/04/29/5 - | |
References | () http://www.openwall.com/lists/oss-security/2016/04/29/8 - | |
References | () http://www.ubuntu.com/usn/USN-2982-1 - | |
References | () https://security.gentoo.org/glsa/201604-04 - |
07 Nov 2023, 02:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-06-13 19:59
Updated : 2024-11-21 02:51
NVD link : CVE-2016-4355
Mitre link : CVE-2016-4355
CVE.ORG link : CVE-2016-4355
JSON object : View
Products Affected
canonical
- ubuntu_linux
gnupg
- libksba
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer