CVE-2016-10195
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
15/03/2017
Last modified:
20/04/2025
Description
The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:libevent_project:libevent:*:*:*:*:*:*:*:* | 2.1.5 (including) | |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2017/dsa-3789
- http://www.openwall.com/lists/oss-security/2017/01/31/17
- http://www.openwall.com/lists/oss-security/2017/02/02/7
- http://www.securityfocus.com/bid/96014
- http://www.securitytracker.com/id/1038320
- https://access.redhat.com/errata/RHSA-2017:1104
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1201
- https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLog
- https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d
- https://github.com/libevent/libevent/issues/317
- https://security.gentoo.org/glsa/201705-01
- http://www.debian.org/security/2017/dsa-3789
- http://www.openwall.com/lists/oss-security/2017/01/31/17
- http://www.openwall.com/lists/oss-security/2017/02/02/7
- http://www.securityfocus.com/bid/96014
- http://www.securitytracker.com/id/1038320
- https://access.redhat.com/errata/RHSA-2017:1104
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1201
- https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLog
- https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d
- https://github.com/libevent/libevent/issues/317
- https://security.gentoo.org/glsa/201705-01