Vulnerability Details : CVE-2016-6263
The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
Vulnerability category: Denial of service
Products affected by CVE-2016-6263
- cpe:2.3:a:gnu:libidn:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6263
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6263
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-6263
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6263
-
http://www.openwall.com/lists/oss-security/2016/07/20/6
oss-security - CVE request: multiple issues fixed in GNU libidn 1.33Mailing List;Third Party Advisory
-
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
-
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
openSUSE-SU-2016:2135-1: moderate: Security update for libidnThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
openSUSE-SU-2016:1924-1: moderate: Security update for libidnThird Party Advisory
-
http://www.securityfocus.com/bid/92070
GNU Libidn Multiple Remote Security VulnerabilitiesThird Party Advisory;VDB Entry
-
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
libidn.git - GNU libidnIssue Tracking;Patch
-
http://www.ubuntu.com/usn/USN-3068-1
USN-3068-1: Libidn vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://security.gentoo.org/glsa/201908-06
glibc: Multiple vulnerabilities (GLSA 201908-06) — Gentoo security
-
http://www.openwall.com/lists/oss-security/2016/07/21/4
oss-security - Re: CVE request: multiple issues fixed in GNU libidn 1.33Mailing List;Third Party Advisory
-
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
Libidn 1.33 releasedVendor Advisory
-
http://www.debian.org/security/2016/dsa-3658
Debian -- Security Information -- DSA-3658-1 libidn
-
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
[GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 - Pony Mail
Jump to