Описание
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.33-1 |
| esm-infra-legacy/trusty | released | 1.28-1ubuntu2.1 |
| esm-infra/xenial | released | 1.32-3ubuntu1.1 |
| precise | released | 1.23-2ubuntu0.1 |
| precise/esm | not-affected | 1.23-2ubuntu0.1 |
| trusty | released | 1.28-1ubuntu2.1 |
| trusty/esm | released | 1.28-1ubuntu2.1 |
| upstream | released | 1.33-1 |
| vivid/stable-phone-overlay | ignored | end of life |
| vivid/ubuntu-core | released | 1.28-1ubuntu2.15.04.1 |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
idn in GNU libidn before 1.33 might allow remote attackers to obtain s ...
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
5 Medium
CVSS2
7.5 High
CVSS3