Vulnerability Details : CVE-2016-5824
libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2016-5824
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
- cpe:2.3:a:libical_project:libical:1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-5824
1.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-5824
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2016-5824
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-5824
-
https://github.com/libical/libical/issues/235
Potentially security-sensitive crashes, best way to get them to you? · Issue #235 · libical/libical · GitHubIssue Tracking;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/91459
libical Multiple Heap Overflow VulnerabilitiesThird Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201904-07
Mozilla Thunderbird and Firefox: Multiple vulnerabilities (GLSA 201904-07) — Gentoo security
-
http://www.openwall.com/lists/oss-security/2017/01/20/16
oss-security - Re: CVE-2016-9584: heap use-after-free on libicalMailing List;Patch;Third Party Advisory
-
https://github.com/libical/libical/issues/251
A heap-buffer-overflow in icaltime_from_string · Issue #251 · libical/libical · GitHubIssue Tracking;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/25/4
oss-security - Re: libical 0.47 SEGV on unknown addressMailing List;Third Party Advisory
-
https://usn.ubuntu.com/3897-1/
USN-3897-1: Thunderbird vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:0269
RHSA-2019:0269 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201904-02
Libical: Multiple vulnerabilities (GLSA 201904-02) — Gentoo security
-
https://access.redhat.com/errata/RHSA-2019:0270
RHSA-2019:0270 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1275400
1275400 - (CVE-2016-5824) Handful use-after-free crashes in libical (used in Thunderbird)Issue Tracking
-
https://github.com/libical/libical/issues/286
CVE-2016-5824: use-after-free issues · Issue #286 · libical/libical · GitHubIssue Tracking;Patch;Third Party Advisory
Jump to