Multiple integer overflows in ber-decoder.c in Libksba before 1.3.3 allow remote attackers to cause a denial of service (crash) via crafted BER data, which leads to a buffer overflow.
References
Configurations
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887 - | |
References | () http://www.openwall.com/lists/oss-security/2016/04/29/5 - | |
References | () http://www.openwall.com/lists/oss-security/2016/04/29/8 - | |
References | () http://www.ubuntu.com/usn/USN-2982-1 - | |
References | () https://security.gentoo.org/glsa/201604-04 - |
07 Nov 2023, 02:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
18 May 2023, 18:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gnupg
Gnupg libksba |
|
CPE | cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:* |
Information
Published : 2016-06-13 19:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-4355
Mitre link : CVE-2016-4355
CVE.ORG link : CVE-2016-4355
JSON object : View
Products Affected
gnupg
- libksba
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer