Vulnerability Name: | CVE-2016-4021 (CCN-112338) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-04-18 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2016-04-18 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2016-06-15 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-4021 Source: FEDORA Type: UNKNOWN FEDORA-2016-8f4b54b005 Source: FEDORA Type: UNKNOWN FEDORA-2016-6fd7a31d36 Source: FEDORA Type: UNKNOWN FEDORA-2016-5733ad20f5 Source: BUGTRAQ Type: Exploit 20160418 CVE-2016-4021: pgpdump 0.29 - Endless loop parsing specially crafted input (SYSS-2016-030) Source: CCN Type: BugTraq Mailing List, Mon, 18 Apr 2016 16:16:45 GMT CVE-2016-4021: pgpdump 0.29 - Endless loop parsing specially crafted input (SYSS-2016-030) Source: CCN Type: pgpdump Web site pgpdump Source: XF Type: UNKNOWN pgpdump-cve20164021-dos(112338) Source: CONFIRM Type: UNKNOWN https://github.com/kazu-yamamoto/pgpdump/pull/16 Source: CCN Type: Packet Storm Security [04-18-2016] TH692 Outdoor P2P HD Waterproof IP Camera Hard-Coded Credentials Source: MISC Type: Exploit https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-4021 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |