CVE-2016-10195

CRITICAL

Libevent < 2.1.5 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.

References (12)

Core 12
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/96014
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1106
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2017/dsa-3789
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/02/02/7
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201705-01
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/libevent/libevent/issues/317
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/31/17
Broken Link, Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1038320
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1104
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1201

Scores

CVSS v3 9.8
EPSS 0.0593
EPSS Percentile 90.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-125
Status published
Products (2)
debian/debian_linux 8.0
libevent_project/libevent < 2.1.5
Published Mar 15, 2017
Tracked Since Feb 18, 2026