Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9036

Опубликовано: 23 дек. 2016
Источник: debian

Описание

An exploitable incorrect return value vulnerability exists in the mp_check function of Tarantool's Msgpuck library 1.0.3. A specially crafted packet can cause the mp_check function to incorrectly return success when trying to check if decoding a map16 packet will read outside the bounds of a buffer, resulting in a denial of service vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
msgpuckfixed1.0.3-1.1package
tarantoolfixed1.7.2.385.g952d79e-1package
tarantoolnot-affectedjessiepackage
tarantoolnot-affectedwheezypackage

Примечания

  • https://github.com/rtsisyk/msgpuck/issues/12

  • https://github.com/tarantool/tarantool/issues/1991

  • http://www.talosintelligence.com/reports/TALOS-2016-0254/

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

An exploitable incorrect return value vulnerability exists in the mp_check function of Tarantool's Msgpuck library 1.0.3. A specially crafted packet can cause the mp_check function to incorrectly return success when trying to check if decoding a map16 packet will read outside the bounds of a buffer, resulting in a denial of service vulnerability.

CVSS3: 7.5
nvd
около 9 лет назад

An exploitable incorrect return value vulnerability exists in the mp_check function of Tarantool's Msgpuck library 1.0.3. A specially crafted packet can cause the mp_check function to incorrectly return success when trying to check if decoding a map16 packet will read outside the bounds of a buffer, resulting in a denial of service vulnerability.

CVSS3: 7.5
github
больше 3 лет назад

An exploitable incorrect return value vulnerability exists in the mp_check function of Tarantool's Msgpuck library 1.0.3. A specially crafted packet can cause the mp_check function to incorrectly return success when trying to check if decoding a map16 packet will read outside the bounds of a buffer, resulting in a denial of service vulnerability.