CVE-2011-1027
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/03/2011
Last modified:
11/04/2025
Description
Off-by-one error in the convert_query_hexchar function in html.c in cgit.cgi in cgit before 0.8.3.5 allows remote attackers to cause a denial of service (infinite loop) via a string composed of a % (percent) character followed by invalid hex characters, as demonstrated by a %gg sequence.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:lars_hjemli:cgit:*:*:*:*:*:*:*:* | 0.8.3.4 (including) | |
| cpe:2.3:a:lars_hjemli:cgit:0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:lars_hjemli:cgit:0.8.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://article.gmane.org/gmane.comp.version-control.git/168493
- http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html
- http://openwall.com/lists/oss-security/2011/03/07/3
- http://secunia.com/advisories/43633
- http://secunia.com/advisories/43788
- http://www.osvdb.org/71005
- http://www.securityfocus.com/bid/46756
- http://www.vupen.com/english/advisories/2011/0667
- https://bugzilla.redhat.com/show_bug.cgi?id=680905
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65919
- http://article.gmane.org/gmane.comp.version-control.git/168493
- http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html
- http://openwall.com/lists/oss-security/2011/03/07/3
- http://secunia.com/advisories/43633
- http://secunia.com/advisories/43788
- http://www.osvdb.org/71005
- http://www.securityfocus.com/bid/46756
- http://www.vupen.com/english/advisories/2011/0667
- https://bugzilla.redhat.com/show_bug.cgi?id=680905
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65919



