Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9132

Опубликовано: 30 янв. 2017
Источник: debian
EPSS Низкий

Описание

In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed. Some API callers may use the returned (incorrect and attacker controlled) length field in a way which later causes memory corruption or other failure.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
botan1.10fixed1.10.14-1package
botan1.10ignoredjessiepackage

Примечания

  • Fixed in 1.10.14 and 1.11.34, all prior versions affected.

  • Fixed by: https://github.com/randombit/botan/commit/987ad747db6d0d7e36f840398f3cf02e2fbfd90f

EPSS

Процентиль: 49%
0.00258
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed. Some API callers may use the returned (incorrect and attacker controlled) length field in a way which later causes memory corruption or other failure.

CVSS3: 9.8
nvd
около 9 лет назад

In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed. Some API callers may use the returned (incorrect and attacker controlled) length field in a way which later causes memory corruption or other failure.

CVSS3: 9.8
github
больше 3 лет назад

In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed. Some API callers may use the returned (incorrect and attacker controlled) length field in a way which later causes memory corruption or other failure.

suse-cvrf
больше 8 лет назад

Security update for Botan

suse-cvrf
больше 8 лет назад

Security update for Botan

EPSS

Процентиль: 49%
0.00258
Низкий