| 0
Critical |
0
High |
0
Medium |
0
Low |
0
Negligible |
| cve | severity | package | current version | fixed in version | introduced in |
CVE-2017-18258 |
Medium
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16932 |
Medium
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9318 |
Medium
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14404 |
Medium
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-5130 |
Medium
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14567 |
Medium
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-5969 |
Low
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser." Technical Impact:
Additionnal information:
|
|||||
CVE-2017-8872 |
Medium
|
libxml2 | 2.9.4+dfsg1-2.2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16869 |
Low
|
nettle | 3.3-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-6311 |
Negligible
|
gdk-pixbuf | 2.36.5-2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
gdk-pixbuf-thumbnailer.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to printing an error message. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-2870 |
Negligible
|
gdk-pixbuf | 2.36.5-2+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18232 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7308 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-3900 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario. Technical Impact:
Additionnal information:
|
|||||
CVE-2010-4563 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The Linux kernel, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9986 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The intr function in sound/oss/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1121 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11486 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7273 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR. Technical Impact:
Additionnal information:
|
|||||
CVE-2011-4917 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11487 |
High
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9503 |
Unknown
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2014-9892 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-8660 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The XFS subsystem in the Linux kernel through 4.8.2 allows local users to cause a denial of service (fdatasync failure and system hang) by using the vfs syscall group in the trinity program, related to a "page lock order bug in the XFS seek hole/data implementation." Technical Impact:
Additionnal information:
|
|||||
CVE-2013-7445 |
High
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11191 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12931 |
High
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ntfs_attr_find in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17977 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to execute crafted applications, as demonstrated on CentOS 7. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-8043 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference). Technical Impact:
Additionnal information:
|
|||||
CVE-2008-2544 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2011-4915 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2016-10723 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
** DISPUTED ** An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that "the underlying problem is non-trivial to handle." Technical Impact:
Additionnal information:
|
|||||
CVE-2014-9900 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ethtool_get_wol function in net/core/ethtool.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not initialize a certain data structure, which allows local users to obtain sensitive information via a crafted application, aka Android internal bug 28803952 and Qualcomm internal bug CR570754. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13693 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-3882 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7754 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address information by reading "ffree: " lines in a debugfs file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12762 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-3874 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20669 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-9465 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In task_get_unused_fd_flags of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69164715 References: Upstream kernel. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5995 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The pcpu_embed_first_chunk function in mm/percpu.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "pages/cpu" printk call. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20449 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "callback=" lines in a debugfs file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12929 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ntfs_read_locked_inode in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a use-after-free read and possibly cause a denial of service (kernel oops or panic) via a crafted ntfs filesystem. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11599 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1108 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated. Technical Impact:
Additionnal information:
|
|||||
CVE-2012-4542 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11472 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. Technical Impact:
Additionnal information:
|
|||||
CVE-2015-2877 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10322 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image. Technical Impact:
Additionnal information:
|
|||||
CVE-2015-8553 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12930 |
High
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ntfs_end_buffer_async_read in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-5489 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13094 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-3719 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The process scheduler in the Linux kernel 2.6.16 gives preference to "interactive" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly Monopolizing the CPU Without Superuser Privileges." Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9500 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13694 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13095 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13093 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-9517 |
High
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-0630 |
Low
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115. Technical Impact:
Additionnal information:
|
|||||
CVE-2010-5321 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Memory leak in drivers/media/video/videobuf-core.c in the videobuf subsystem in the Linux kernel 2.6.x through 4.x allows local users to cause a denial of service (memory consumption) by leveraging /dev/video access for a series of mmap calls that require new allocations, a different vulnerability than CVE-2007-6761. NOTE: as of 2016-06-18, this affects only 11 drivers that have not been updated to use videobuf2 instead of videobuf. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-3693 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. Technical Impact:
Additionnal information:
|
|||||
CVE-2004-0230 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. Technical Impact:
Additionnal information:
|
|||||
CVE-2005-3660 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13695 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. Technical Impact:
Additionnal information:
|
|||||
CVE-2008-4609 |
Negligible
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12928 |
Medium
|
linux | 4.9.168-1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-3477 |
Low
|
libwmf | 0.2.8.4-10.6 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-3996 |
Medium
|
libwmf | 0.2.8.4-10.6 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function. Technical Impact:
Additionnal information:
|
|||||
CVE-2009-3546 |
Medium
|
libwmf | 0.2.8.4-10.6 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-3476 |
Low
|
libwmf | 0.2.8.4-10.6 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9113 |
Low
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp could cause the application to crash or execute arbitrary code. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18444 |
Negligible
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
makeMultiView.cpp in exrmultiview in OpenEXR 2.3.0 has an out-of-bounds write, leading to an assertion failure or possibly unspecified other impact. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18443 |
Low
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
OpenEXR 2.3.0 has a memory leak in ThreadPool in IlmBase/IlmThread/IlmThreadPool.cpp, as demonstrated by exrmultiview. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9111 |
Medium
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h could cause the application to crash or execute arbitrary code. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9110 |
Medium
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9114 |
Medium
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9112 |
Medium
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, an invalid read of size 1 in the getBits function in ImfHuf.cpp could cause the application to crash. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9115 |
Medium
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, an invalid write of size 2 in the = operator function in half.h could cause the application to crash or execute arbitrary code. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12596 |
Medium
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it may result in denial of service or possibly unspecified other impact. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14988 |
Negligible
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9116 |
Medium
|
openexr | 2.2.0-11 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenEXR 2.2.0, an invalid read of size 1 in the uncompress function in ImfZip.cpp could cause the application to crash. Technical Impact:
Additionnal information:
|
|||||
CVE-2015-9019 |
Negligible
|
libxslt | 1.1.29-2.1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11068 |
High
|
libxslt | 1.1.29-2.1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7999 |
Medium
|
graphite2 | 1.3.10-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-2614 |
Low
|
mariadb-10.1 | 10.1.38-0+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). Technical Impact:
Additionnal information:
|
|||||
CVE-2019-2627 |
Medium
|
mariadb-10.1 | 10.1.38-0+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9937 |
Negligible
|
jbigkit | 2.1-3.1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In LibTIFF 4.0.8, there is a memory malloc failure in tif_jbig.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-7475 |
Low
|
cairo | 1.14.8-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-6461 |
Low
|
cairo | 1.14.8-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18064 |
Low
|
cairo | 1.14.8-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function). Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9814 |
Low
|
cairo | 1.14.8-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-6462 |
Low
|
cairo | 1.14.8-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized. Technical Impact:
Additionnal information:
|
|||||
CVE-2014-8166 |
Negligible
|
cups | 2.2.1-8+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name. Technical Impact:
Additionnal information:
|
|||||
CVE-2008-1688 |
Negligible
|
m4 | 1.4.18-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Unspecified vulnerability in GNU m4 before 1.4.11 might allow context-dependent attackers to execute arbitrary code, related to improper handling of filenames specified with the -F option. NOTE: it is not clear when this issue crosses privilege boundaries. Technical Impact:
Additionnal information:
|
|||||
CVE-2008-1687 |
Negligible
|
m4 | 1.4.18-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The (1) maketemp and (2) mkstemp builtin functions in GNU m4 before 1.4.11 do not quote their output when a file is created, which might allow context-dependent attackers to trigger a macro expansion, leading to unspecified use of an incorrect filename. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11464 |
Medium
|
librsvg | 2.40.16-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A SIGFPE is raised in the function box_blur_line of rsvg-filter.c in GNOME librsvg 2.40.17 during an attempted parse of a crafted SVG file, because of incorrect protection against division by zero. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-8905 |
Medium
|
file | 1:5.30-1+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-8907 |
Medium
|
file | 1:5.30-1+deb9u2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-2379 |
Negligible
|
jquery | 3.1.1-2+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking." Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20030 |
High
|
libexif | 0.6.21-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-7544 |
Medium
|
libexif | 0.6.21-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-6328 |
Medium
|
libexif | 0.6.21-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data). Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12691 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-10131 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-8678 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says "This is a Q64 issue and we do not support Q64." Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6405 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In the ReadDCMImage function in coders/dcm.c in ImageMagick before 7.0.7-23, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allows remote attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5246 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18252 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13658 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick before 6.9.9-3 and 7.x before 7.0.6-3, there is a missing NULL check in the ReadMATImage function in coders/mat.c, leading to a denial of service (assertion failure and application exit) in the DestroyImageInfo function in MagickCore/image.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11598 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14739 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The AcquireResampleFilterThreadSet function in magick/resample-private.h in ImageMagick 7.0.7-4 mishandles failed memory allocation, which allows remote attackers to cause a denial of service (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and application crash) via unspecified vectors. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12673 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneMNGImage in coders/png.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-11655 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-20 Q16 x86_64, a memory leak vulnerability was found in the function GetImagePixelCache in MagickCore/cache.c, which allows attackers to cause a denial of service via a crafted CALS image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11472 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18544 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7397 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11755 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14175 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14343 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14174 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14434 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7396 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12430 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12564 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5247 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadRLAImage in coders/rla.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7470 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in ImageMagick 7.0.7-22 Q16. The IsWEBPImageLossless function in coders/webp.c allows attackers to cause a denial of service (segmentation violation) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14137 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14551 |
High
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadMATImageV4 function in coders/mat.c in ImageMagick 7.0.8-7 uses an uninitialized variable, leading to memory corruption. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12667 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14341 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-6 has a large loop vulnerability in ReadWPGImage in coders/wpg.c, causing CPU exhaustion via a crafted wpg image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16640 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17883 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPGXImage in coders/pgx.c, which allows attackers to cause a denial of service via a crafted PGX image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17887 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14741 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadCAPTIONImage function in coders/caption.c in ImageMagick 7.0.7-3 allows remote attackers to cause a denial of service (infinite loop) via a crafted font file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7175 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15017 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadOneMNGImage in coders/png.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13058 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allows attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17886 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service via a crafted psd image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12675 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-3, a missing check for multidimensional data was found in coders/mat.c, leading to a memory leak in the function ReadImage in MagickCore/constitute.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2008-3134 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7395 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11531 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13131 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-8, a memory leak vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (memory consumption in NewLinkedList in MagickCore/linked-list.c) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5357 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-22 Q16 has memory leaks in the ReadDCMImage function in coders/dcm.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17967 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-28 has a memory leak vulnerability in ReadBGRImage in coders/bgr.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11724 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadMATImage function in coders/mat.c in ImageMagick through 6.9.9-3 and 7.x through 7.0.6-3 has memory leaks involving the quantum_info and clone_info data structures. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14172 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18209 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In the GetOpenCLCachedFilesDirectory function in magick/opencl.c in ImageMagick 7.0.7, a NULL pointer dereference vulnerability occurs because a memory allocation result is not checked, related to GetOpenCLCacheDirectory. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12643 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-1 has a memory exhaustion vulnerability in ReadOneJNGImage in coders\png.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14326 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15016 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadEnhMetaFile in coders/emf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-1000445 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-1 and older version are vulnerable to null pointer dereference in the MagickCore component and might lead to denial of service Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2017-1000445 |
|||||
CVE-2018-20467 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15032 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick version 7.0.7-2 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12565 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17682 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11536 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteJP2Image() function in coders/jp2.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14528 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11539 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadOnePNGImage() function in coders/png.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12566 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMVGImage in coders/mvg.c, which allows attackers to cause a denial of service, related to the function ReadSVGImage in svg.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14532 |
High
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 has a NULL Pointer Dereference in TIFFIgnoreTags in coders/tiff.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-7275 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12664 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14533 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-6 has a memory leak in ReadMATImage in coders/mat.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12668 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-1000476 |
High
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-12 Q16, a CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2017-1000476 |
|||||
CVE-2017-11534 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the lite_font_map() function in coders/wmf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12641 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18022 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-8960 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-9135 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-24 Q16, there is a heap-based buffer over-read in IsWEBPImageLossless in coders/webp.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18028 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11752 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadMAGICKImage function in coders/magick.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17934 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-17 Q16 x86_64 has memory leaks in coders/msl.c, related to MSLPopImage and ProcessMSLScript, and associated with mishandling of MSLPushImage calls. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15033 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick version 7.0.7-2 contains a memory leak in ReadYUVImage in coders/yuv.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14324 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12427 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10177 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-28, there is an infinite loop in the ReadOneMNGImage function of the coders/png.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted mng file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17880 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a stack-based buffer over-read in WriteWEBPImage in coders/webp.c, related to a WEBP_DECODER_ABI_VERSION check. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12435 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17681 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, an infinite loop vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted psd image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13153 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.8-4, there is a memory leak in the XMagickCommand function in MagickCore/animate.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10805 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14342 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-6 has a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c via a crafted wpg image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13146 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick before 6.9.8-5 and 7.x before 7.0.5-6, there is a memory leak in the ReadMATImage function in coders/mat.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18271 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted MIFF image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12642 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMPCImage in coders\mpc.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14625 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_output_create in coders/sixel.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12563 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-2, a memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2005-0406 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12669 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14060 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-10, a NULL Pointer Dereference issue is present in the ReadCUTImage function in coders/cut.c that could allow an attacker to cause a Denial of Service (in the QueueAuthenticPixelCacheNexus function within the MagickCore/cache.c file) by submitting a malformed image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14139 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMSLImage in coders/msl.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11754 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18027 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12692 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadVIFFImage function in coders/viff.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11597 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14624 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function PostscriptDelegateMessage in coders/ps.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-8804 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
WriteEPTImage in coders/ept.c in ImageMagick 7.0.7-25 Q16 allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13768 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
Null Pointer Dereference in the IdentifyImage function in MagickCore/identify.c in ImageMagick through 7.0.6-10 allows an attacker to perform denial of service by sending a crafted image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15218 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11644 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadMATImage() function in coders/mat.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5358 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-22 Q16 has memory leaks in the EncodeImageAttributes function in coders/json.c, as demonstrated by the ReadPSDLayersInternal function in coders/psd.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12418 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15217 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13060 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-5, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17882 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted XPM image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18211 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7, a NULL pointer dereference vulnerability was found in the function saveBinaryCLProgram in magick/opencl.c because a program-lookup result is not checked, related to CacheOpenCLKernel. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14626 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_decode in coders/sixel.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14325 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function PersistPixelCache in magick/cache.c, which allows attackers to cause a denial of service (memory consumption in ReadMPCImage in coders/mpc.c) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17966 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePDBImage in coders/pdb.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13061 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-5, a length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17680 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12663 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15015 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in PDFDelegateMessage in coders/pdf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10804 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick version 7.0.7-28 contains a memory leak in WriteTIFFImage in coders/tiff.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12665 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18016 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17965 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-15607 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18008 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-17 Q16, there is a Memory Leak in ReadPWPImage in coders/pwp.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18251 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12670 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-3, missing validation was found in coders/mat.c, leading to an assertion failure in the function DestroyImage in MagickCore/image.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14531 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-0 has a memory exhaustion issue in ReadSUNImage in coders/sun.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14437 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16643 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14173 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation "GetQuantumRange(depth)+1" when "depth" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large "max_value" value. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17885 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allows attackers to cause a denial of service via a crafted PICT image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11751 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14138 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-5 has a memory leak vulnerability in ReadWEBPImage in coders/webp.c because memory is not freed in certain error cases, as demonstrated by VP8 errors. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18273 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadTXTImage in coders/txt.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted image file that is mishandled in a GetImageIndexInList call. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14505 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
DrawGetStrokeDashArray in wand/drawing-wand.c in ImageMagick 7.0.7-1 mishandles certain NULL arrays, which allows attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11532 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13062 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function formatIPTC in coders/meta.c, which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12662 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14249 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-8 Q16 mishandles EOF checks in ReadMPCImage in coders/mpc.c, leading to division by zero in GetPixelCacheTileSize in MagickCore/cache.c, allowing remote attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17884 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12654 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadPICTImage function in coders/pict.c in ImageMagick 7.0.6-3 allows attackers to cause a denial of service (memory leak) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13059 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WriteOneJNGImage in coders/png.c, which allows attackers to cause a denial of service (WriteJNGImage memory consumption) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-10714 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12674 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-2, a CPU exhaustion vulnerability was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14435 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-11470 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14684 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-4 Q16, a memory leak vulnerability was found in the function ReadVIPSImage in coders/vips.c, which allows attackers to cause a denial of service (memory consumption in ResizeMagickMemory in MagickCore/memory.c) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17914 |
High
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-16 Q16, a vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service (ReadOneMNGImage large loop) via a crafted mng image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15281 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)." Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18254 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12676 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13133 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18029 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-10 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18025 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12433 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-1, a memory leak vulnerability was found in the function ReadPESImage in coders/pes.c, which allows attackers to cause a denial of service, related to ResizeMagickMemory in memory.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12666 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteINLINEImage in coders/inline.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-10649 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16750 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c was found. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7443 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-23 Q16 does not properly validate the amount of image data in a file, which allows remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c). Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17881 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-11656 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-20 Q16 x86_64, a memory leak vulnerability was found in the function ReadDCMImage in coders/dcm.c, which allows attackers to cause a denial of service via a crafted DCM image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18024 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.8-13 Q16, there is an infinite loop in the ReadBMPImage function of the coders/bmp.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12672 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16749 |
Medium
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12644 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-6502 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue was discovered in ImageMagick 6.9.7. A specially crafted webp file could lead to a file-descriptor leak in libmagickcore (thus, a DoS). Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14400 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.7-1 Q16, the PersistPixelCache function in magick/cache.c mishandles the pixel cache nexus, which allows remote attackers to cause a denial of service (NULL pointer dereference in the function GetVirtualPixels in MagickCore/cache.c) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12875 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The WritePixelCachePixels function in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (CPU consumption) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12140 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadDCMImage function in coders\dcm.c in ImageMagick 7.0.6-1 has an integer signedness error leading to excessive memory consumption via a crafted DCM file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12429 |
High
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12693 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
The ReadBMPImage function in coders/bmp.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted BMP file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14436 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7398 |
Negligible
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-9133 |
Low
|
imagemagick | 8:6.9.7.4+dfsg-11+deb9u7 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tiff file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15298 |
Negligible
|
git | 1:2.11.0-3+deb9u4 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Git through 2.14.2 mishandles layers of tree objects, which allows remote attackers to cause a denial of service (memory consumption) via a crafted repository, aka a Git bomb. This can also have an impact of disk consumption; however, an affected process typically would not survive its attempt to build the data structure in memory before writing to disk. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000021 |
Negligible
|
git | 1:2.11.0-3+deb9u4 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack). Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000021 |
|||||
CVE-2019-11023 |
Negligible
|
graphviz | 2.38.0-17 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The agroot() function in cgraph\obj.c in libcgraph.a in Graphviz 2.39.20160612.1140 has a NULL pointer dereference, as demonstrated by graphml2gv. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9904 |
Low
|
graphviz | 2.38.0-17 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10196 |
Low
|
graphviz | 2.38.0-17 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
NULL pointer dereference vulnerability in the rebuild_vlists function in lib/dotgen/conc.c in the dotgen library in Graphviz 2.40.1 allows remote attackers to cause a denial of service (application crash) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9750 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17122 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The dump_relocs_in_section function in objdump.c in GNU Binutils 2.29.1 does not check for reloc count integer overflows, which allows remote attackers to cause a denial of service (excessive memory allocation, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PE file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20712 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15996 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18483 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7570 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12934 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9040 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15225 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
_bfd_dwarf2_cleanup_debug_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory leak) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9751 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
opcodes/rl78-decode.opc in GNU Binutils 2.28 has an unbounded GETBYTE macro, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12450 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16831 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14933 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-8945 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9954 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The getvalue function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted tekhex file, as demonstrated by mishandling within the nm program. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12449 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_vms_save_sized_string function in vms-misc.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9746 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-9996 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9038 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9756 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000876 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000876 |
|||||
CVE-2018-9138 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.29 and 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_nested_args, demangle_args, do_arg, and do_type. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12641 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9076 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9044 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15024 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
find_abstract_instance_name in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9755 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9071 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9072 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12457 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The bfd_make_section_with_flags function in section.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a NULL dereference via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12458 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The nlm_swap_auxiliary_headers_in function in bfd/nlmcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted nlm file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9753 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The versados_mkobject function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not initialize a certain data structure, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17360 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14129 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20002 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_generic_read_minisymbols function in syms.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, has a memory leak via a crafted ELF file, leading to a denial of service (memory consumption), as demonstrated by nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9752 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14938 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
_bfd_elf_slurp_version_tables in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17794 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in work_stuff_copy_to_from when called from iterate_demangle_function. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6759 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13716 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd). Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9745 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_vms_slurp_etir function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14745 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15020 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles pointers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file, related to parse_die and parse_line_table, as demonstrated by a parse_die heap-based buffer over-read. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16830 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9955 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12452 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17121 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (memory access violation) or possibly have unspecified other impact via a COFF binary in which a relocation refers to a location after the end of the to-be-relocated section. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14940 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
scan_unit_for_symbols in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10534 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16827 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7642 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12456 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6543 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9074 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12967 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The getsym function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a malformed tekhex binary. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9039 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18309 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17358 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12700 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9749 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The *regs* macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14529 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16828 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17123 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The coff_slurp_reloc_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted COFF based file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9041 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to MIPS GOT mishandling in the process_mips_specific function in readelf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9042 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13757 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7569 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17125 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
nm.c and objdump.c in GNU Binutils 2.29.1 mishandle certain global symbols, which allows remote attackers to cause a denial of service (_bfd_elf_get_symbol_version_string buffer over-read and application crash) or possibly have unspecified other impact via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18484 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12453 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16829 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10535 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15025 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9073 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-19931 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18606 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14130 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12799 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12699 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14729 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15021 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
bfd_get_debug_link_info_1 in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to bfd_getl32. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14974 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9748 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9743 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The print_insn_score32 function in opcodes/score7-dis.c:552 in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13710 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The setup_group function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a group section that is too small. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18607 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14932 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12455 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The evax_bfd_print_emh function in vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9747 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9043 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
readelf.c in GNU Binutils 2017-04-12 has a "shift exponent too large for type unsigned long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14333 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17124 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10372 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17126 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The load_debug_section function in readelf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via an ELF file that lacks section headers. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-19932 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14930 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Memory leak in decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9742 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The score_opcodes function in opcodes/score7-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16826 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6323 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20671 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17080 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate sizes of core notes, which allows remote attackers to cause a denial of service (bfd_getl32 heap-based buffer over-read and application crash) via a crafted object file, related to elfcore_grok_netbsd_procinfo, elfcore_grok_openbsd_procinfo, and elfcore_grok_nto_status. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16832 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20651 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14128 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15023 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15022 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the DW_AT_name data type, which allows remote attackers to cause a denial of service (bfd_hash_hash NULL pointer dereference, or out-of-bounds access, and application crash) via a crafted ELF file, related to scan_unit_for_symbols and parse_comp_unit. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7643 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20623 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13033 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file, as demonstrated by _bfd_elf_parse_attributes in elf-attrs.c and bfd_malloc in libbfd.c. This can occur during execution of nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18701 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions next_is_type_qual() and cplus_demangle_type() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12697 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9070 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14934 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
process_debug_info in dwarf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file that contains a negative size value in a CU structure. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20657 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12459 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The bfd_mach_o_read_symtab_strtab function in bfd/mach-o.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted mach-o file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7208 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17985 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20673 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for "Create an array for saving the template argument values") that can trigger a heap-based buffer overflow, as demonstrated by nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9075 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12451 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_xcoff_read_ar_hdr function in bfd/coff-rs6000.c and bfd/coff64-rs6000.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds stack read via a crafted COFF image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10373 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9754 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The process_otr function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not validate a certain offset, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12454 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9077 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6872 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7568 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12698 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15938 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash). Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9744 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14939 |
Low
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles a length calculation, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to read_1_byte. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17359 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18605 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12448 |
Medium
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18700 |
Negligible
|
binutils | 2.28-5 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), d_encoding(), and d_local_name() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2011-3374 |
Negligible
|
apt | 1.4.9 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2017-13685 |
Negligible
|
sqlite3 | 3.16.2-5+deb9u1 | sha256:1b2a72d4e03052566e99130108071fc4eca4942c62923e3e5cf19666a23088ef_1a073e9d70a9 | |
|
Description:
The dump_callback function in SQLite 3.20.0 allows remote attackers to cause a denial of service (EXC_BAD_ACCESS and application crash) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20346 |
Medium
|
sqlite3 | 3.16.2-5+deb9u1 | sha256:1b2a72d4e03052566e99130108071fc4eca4942c62923e3e5cf19666a23088ef_1a073e9d70a9 | |
|
Description:
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9937 |
Low
|
sqlite3 | 3.16.2-5+deb9u1 | sha256:1b2a72d4e03052566e99130108071fc4eca4942c62923e3e5cf19666a23088ef_1a073e9d70a9 | |
|
Description:
In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-8740 |
Medium
|
sqlite3 | 3.16.2-5+deb9u1 | sha256:1b2a72d4e03052566e99130108071fc4eca4942c62923e3e5cf19666a23088ef_1a073e9d70a9 | |
|
Description:
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20505 |
Medium
|
sqlite3 | 3.16.2-5+deb9u1 | sha256:1b2a72d4e03052566e99130108071fc4eca4942c62923e3e5cf19666a23088ef_1a073e9d70a9 | |
|
Description:
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9936 |
Low
|
sqlite3 | 3.16.2-5+deb9u1 | sha256:1b2a72d4e03052566e99130108071fc4eca4942c62923e3e5cf19666a23088ef_1a073e9d70a9 | |
|
Description:
In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20506 |
Medium
|
sqlite3 | 3.16.2-5+deb9u1 | sha256:1b2a72d4e03052566e99130108071fc4eca4942c62923e3e5cf19666a23088ef_1a073e9d70a9 | |
|
Description:
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12618 |
Low
|
apr-util | 1.5.4-3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Apache Portable Runtime Utility (APR-util) 1.6.0 and prior fail to validate the integrity of SDBM database files used by apr_sdbm*() functions, resulting in a possible out of bound read access. A local user with write access to the database can make a program or process using these functions crash, and cause a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-10713 |
Negligible
|
patch | 2.7.5-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6952 |
Negligible
|
patch | 2.7.5-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6951 |
Negligible
|
patch | 2.7.5-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue. Technical Impact:
Additionnal information:
|
|||||
CVE-2010-4651 |
Negligible
|
patch | 2.7.5-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-8834 |
Low
|
libcroco | 0.6.11-3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-8871 |
Low
|
libcroco | 0.6.11-3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The cr_parser_parse_selector_core function in cr-parser.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted CSS file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15088 |
Negligible
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5709 |
Negligible
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11462 |
Low
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5729 |
Medium
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5730 |
Medium
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20217 |
Low
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request. Technical Impact:
Additionnal information:
|
|||||
CVE-2004-0971 |
Negligible
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5710 |
Medium
|
krb5 | 1.15-1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17740 |
Negligible
|
openldap | 2.4.44+dfsg-5+deb9u2 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation. Technical Impact:
Additionnal information:
|
|||||
CVE-2015-3276 |
Negligible
|
openldap | 2.4.44+dfsg-5+deb9u2 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14159 |
Negligible
|
openldap | 2.4.44+dfsg-5+deb9u2 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-5563 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10126 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
LibTIFF 4.0.9 has a NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17000 |
Medium
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c (called from TIFFWriteDirectoryTagTransferfunction) in LibTIFF 4.0.9 allows an attacker to cause a denial-of-service through a crafted tiff file. This vulnerability can be triggered by the executable tiffcp. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16232 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-9117 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, leading to a heap-based buffer over-read in bmp2tiff. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-17100 |
Medium
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17973 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-12900 |
Medium
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2014-8130 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7663 |
Medium
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted tiff file. This is different from CVE-2018-12900. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-6128 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18661 |
Negligible
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17942 |
Low
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-19210 |
Medium
|
tiff | 4.0.8-2+deb9u4 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-1000082 |
Negligible
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2017-1000082 |
|||||
CVE-2019-3843 |
Medium
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16888 |
Low
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6954 |
Low
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on. Technical Impact:
Additionnal information:
|
|||||
CVE-2013-4392 |
Negligible
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18078 |
Medium
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9619 |
Unknown
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2019-3844 |
Medium
|
systemd | 232-25+deb9u11 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled. Technical Impact:
Additionnal information:
|
|||||
CVE-2013-0340 |
Negligible
|
expat | 2.2.0-2+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7169 |
Low
|
shadow | 1:4.4-4.1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-5686 |
Negligible
|
shadow | 1:4.4-4.1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts. NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers. Technical Impact:
Additionnal information:
|
|||||
CVE-2013-4235 |
Negligible
|
shadow | 1:4.4-4.1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12424 |
High
|
shadow | 1:4.4-4.1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000168 |
Low
|
nghttp2 | 1.18.1-1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000168 |
|||||
CVE-2019-9193 |
Negligible
|
postgresql-9.6 | 9.6.12-0+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
** DISPUTED ** In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_read_server_files' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ?COPY TO/FROM PROGRAM? is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ?COPY FROM PROGRAM?. Furthermore, members in 'pg_read_server_files' can run commands only if either the 'pg_execute_server_program' role or superuser are granted. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-19211 |
Low
|
ncurses | 6.0+20161126-1+deb9u2 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-10754 |
Low
|
ncurses | 6.0+20161126-1+deb9u2 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In ncurses before 6.1.20180414, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service if the terminfo library code is used to process untrusted terminfo data in which a use-name is invalid syntax. The product proceeds to the dereference code path even after a "dubious character `[' in name or alias field" detection. Technical Impact:
Additionnal information:
|
|||||
CVE-2010-0928 |
Negligible
|
openssl | 1.1.0j-1~deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack." Technical Impact:
Additionnal information:
|
|||||
CVE-2007-6755 |
Negligible
|
openssl | 1.1.0j-1~deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-1543 |
Low
|
openssl | 1.1.0j-1~deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c-dev (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k-dev (Affected 1.1.0-1.1.0j). Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9740 |
Medium
|
python3.5 | 3.5.3-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n followed by an HTTP header or a Redis command. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-5010 |
Unknown
|
python3.5 | 3.5.3-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17522 |
Negligible
|
python3.5 | 3.5.3-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
** DISPUTED ** Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20406 |
Medium
|
python3.5 | 3.5.3-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9636 |
Medium
|
python3.5 | 3.5.3-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9947 |
Medium
|
python3.5 | 3.5.3-1+deb9u1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string or PATH_INFO) followed by an HTTP header or a Redis command. This is similar to CVE-2019-9740. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6829 |
Negligible
|
libgcrypt20 | 1.7.6-2+deb9u3 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-7246 |
Negligible
|
pcre3 | 2:8.39-3 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-16231 |
Negligible
|
pcre3 | 2:8.39-3 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-7245 |
Negligible
|
pcre3 | 2:8.39-3 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-11164 |
Negligible
|
pcre3 | 2:8.39-3 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-18018 |
Negligible
|
coreutils | 8.26-3 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-2781 |
Low
|
coreutils | 8.26-3 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9085 |
Negligible
|
libwebp | 0.5.2-1 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Multiple integer overflows in libwebp allows attackers to have unspecified impact via unknown vectors. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-14062 |
High
|
libidn | 1.33-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-3829 |
Medium
|
gnutls28 | 3.5.8-5+deb9u4 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16868 |
Low
|
gnutls28 | 3.5.8-5+deb9u4 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. Technical Impact:
Additionnal information:
|
|||||
CVE-2011-3389 |
Medium
|
gnutls28 | 3.5.8-5+deb9u4 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-3836 |
Medium
|
gnutls28 | 3.5.8-5+deb9u4 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16403 |
Low
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7664 |
Low
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash). Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7150 |
Medium
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7665 |
Medium
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18520 |
Medium
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7149 |
Medium
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16402 |
Low
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18310 |
Medium
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7148 |
Negligible
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
**DISPUTED** An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens." Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16062 |
Medium
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-18521 |
Medium
|
elfutils | 0.168-1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-1000019 |
Medium
|
libarchive | 3.2.2-2+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2019-1000019 |
|||||
CVE-2019-1000020 |
Medium
|
libarchive | 3.2.2-2+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2019-1000020 |
|||||
CVE-2011-4116 |
Negligible
|
perl | 5.24.1-3+deb9u5 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000030 |
Negligible
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000030 |
|||||
CVE-2013-7040 |
Negligible
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9740 |
Medium
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n followed by an HTTP header or a Redis command. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-5010 |
Unknown
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17522 |
Negligible
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
** DISPUTED ** Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9636 |
Medium
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9948 |
Medium
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9947 |
Medium
|
python2.7 | 2.7.13-2+deb9u3 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string or PATH_INFO) followed by an HTTP header or a Redis command. This is similar to CVE-2019-9740. Technical Impact:
Additionnal information:
|
|||||
CVE-2008-3234 |
Negligible
|
openssh | 1:7.4p1-10+deb9u6 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-2768 |
Negligible
|
openssh | 1:7.4p1-10+deb9u6 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243. Technical Impact:
Additionnal information:
|
|||||
CVE-2007-2243 |
Negligible
|
openssh | 1:7.4p1-10+deb9u6 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-6110 |
Negligible
|
openssh | 1:7.4p1-10+deb9u6 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-15919 |
Low
|
openssh | 1:7.4p1-10+deb9u6 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.' Technical Impact:
Additionnal information:
|
|||||
CVE-2018-9234 |
Low
|
gnupg2 | 2.1.18-8~deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000858 |
Medium
|
gnupg2 | 2.1.18-8~deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000858 |
|||||
CVE-2018-1152 |
Medium
|
libjpeg-turbo | 1:1.5.1-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
libjpeg-turbo 1.5.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted BMP image. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-15232 |
Negligible
|
libjpeg-turbo | 1:1.5.1-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
libjpeg-turbo 1.5.2 has a NULL Pointer Dereference in jdpostct.c and jquant1.c via a crafted JPEG file. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14498 |
Medium
|
libjpeg-turbo | 1:1.5.1-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9113 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image->comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9115 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17479 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-5727 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9581 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An infinite loop vulnerability in tiftoimage that results in heap buffer overflow in convert_32s_C1P1 was found in openjpeg 2.1.2. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9580 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-7648 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16376 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16375 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-6988 |
Low
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opj_calloc in openjp2/opj_malloc.c, when called from opj_tcd_init_tile in openjp2/tcd.c, as demonstrated by the 64-bit opj_decompress. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9114 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image->comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9117 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-10506 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-10505 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9112 |
Medium
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-9116 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12982 |
Negligible
|
openjpeg2 | 2.1.2-1.1+deb9u3 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_malloc.c. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-6519 |
Negligible
|
avahi | 0.6.32-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809. Technical Impact:
Additionnal information:
|
|||||
CVE-2008-4108 |
Negligible
|
python-defaults | 2.7.13-2 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9923 |
Negligible
|
tar | 1.29b-1.1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20482 |
Low
|
tar | 1.29b-1.1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root). Technical Impact:
Additionnal information:
|
|||||
CVE-2005-2541 |
Negligible
|
tar | 1.29b-1.1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-2779 |
High
|
util-linux | 2.29.2-1+deb9u1 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6485 |
High
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-10739 |
Medium
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12132 |
Medium
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation. Technical Impact:
Additionnal information:
|
|||||
CVE-2010-4051 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow." Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000001 |
High
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000001 |
|||||
CVE-2009-5155 |
Medium
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match. Technical Impact:
Additionnal information:
|
|||||
CVE-2016-10228 |
Low
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-20796 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\\1\\1|t1|\\\2537)+' in grep. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-7309 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9192 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern. Technical Impact:
Additionnal information:
|
|||||
CVE-2010-4052 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-6551 |
High
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption. Technical Impact:
Additionnal information:
|
|||||
CVE-2010-4756 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-9169 |
High
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match. Technical Impact:
Additionnal information:
|
|||||
CVE-2015-8985 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-6488 |
Negligible
|
glibc | 2.24-11+deb9u4 | sha256:e79bb959ec00faf01da52437df4fad4537ec669f60455a38ad583ec2b8f00498_1a073e9d70a9 | |
|
Description:
The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13347 |
High
|
mercurial | 4.0-1+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
mpatch.c in Mercurial before 4.6.1 mishandles integer addition and subtraction, aka OVE-20180430-0002. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13348 |
Medium
|
mercurial | 4.0-1+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situations where there should be at least 12 bytes remaining after the current position in the patch data, but actually are not, aka OVE-20180430-0001. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000132 |
Medium
|
mercurial | 4.0-1+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000132 |
|||||
CVE-2018-17983 |
Negligible
|
mercurial | 4.0-1+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry. Technical Impact:
Additionnal information:
|
|||||
CVE-2019-3902 |
Medium
|
mercurial | 4.0-1+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-13346 |
Medium
|
mercurial | 4.0-1+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-17458 |
High
|
mercurial | 4.0-1+deb9u1 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, but they can be created programmatically. Technical Impact:
Additionnal information:
|
|||||
CVE-2017-12613 |
Low
|
apr | 1.5.2-5 | sha256:d54db43011fd116b8cb6d9e49e268cee1fa6212f152b30cbfa7f3c4c684427c3_1a073e9d70a9 | |
|
Description:
When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input. Technical Impact:
Additionnal information:
|
|||||
CVE-2012-0039 |
Negligible
|
glib2.0 | 2.50.3-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
** DISPUTED ** GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16428 |
Low
|
glib2.0 | 2.50.3-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-16429 |
Low
|
glib2.0 | 2.50.3-2 | sha256:69d473365bb390367b7a54a3e890ca28c4640a56dfe4f53a0036130c964a1e52_1a073e9d70a9 | |
|
Description:
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str(). Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14550 |
Negligible
|
libpng1.6 | 1.6.28-1+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
None Technical Impact:
Additionnal information:
|
|||||
CVE-2019-6129 |
Negligible
|
libpng1.6 | 1.6.28-1+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
** DISPUTED ** png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp. NOTE: a third party has stated "I don't think it is libpng's job to free this buffer." Technical Impact:
Additionnal information:
|
|||||
CVE-2018-14048 |
Negligible
|
libpng1.6 | 1.6.28-1+deb9u1 | sha256:7ded6dfee82dae76bd63e1649d83f1170615c924af7b90b85ece57e5b6942685_1a073e9d70a9 | |
|
Description:
An issue has been found in libpng 1.6.34. It is a SEGV in the function png_free_data in png.c, related to the recommended error handling for png_read_image. Technical Impact:
Additionnal information:
|
|||||
CVE-2018-1000654 |
Negligible
|
libtasn1-6 | 4.10-1.1+deb9u1 | sha256:d4b7902036fe0cefdfe9ccf0404fe13322ecbd552f132be73d3e840f95538838_1a073e9d70a9 | |
|
Description:
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file. Technical Impact:
Additionnal information:
https://security-tracker.debian.org/tracker/CVE-2018-1000654 |
|||||