Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4021

Опубликовано: 26 мая 2016
Источник: debian
EPSS Низкий

Описание

The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pgpdumpfixed0.31-0.1package
pgpdumpfixed0.28-1+deb8u1jessiepackage

Примечания

  • https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt

  • https://github.com/kazu-yamamoto/pgpdump/pull/16

EPSS

Процентиль: 87%
0.03451
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.

CVSS3: 7.5
nvd
больше 9 лет назад

The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.

CVSS3: 7.5
github
больше 3 лет назад

The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.

EPSS

Процентиль: 87%
0.03451
Низкий