Описание
The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2016-4021
- https://github.com/kazu-yamamoto/pgpdump/pull/16
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html
- http://seclists.org/bugtraq/2016/Apr/99
Связанные уязвимости
The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
The read_binary function in buffer.c in pgpdump before 0.30 allows con ...