CVE-2016-10195Out-of-bounds Read in Libevent

CWE-125Out-of-bounds Read12 documents7 sources
Severity
9.8CRITICALNVD
EPSS
5.9%
top 9.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 15
Latest updateMay 13

Description

The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

debiandebian/libevent< libevent 2.0.21-stable-3 (bookworm)
Debianlibevent_project/libevent< 2.0.21-stable-3+3
Ubuntumozilla/thunderbird< 1:52.1.1+build1-0ubuntu0.14.04.1+1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3x9p-6xxq-5rhj: The name_parse function in evdns2022-05-13
OSV
thunderbird vulnerabilities2017-05-16
OSV
CVE-2016-10195: The name_parse function in evdns2017-03-15

📋Vendor Advisories

5
Ubuntu
Thunderbird vulnerabilities2017-05-16
Red Hat
Mozilla: Vulnerabilities in libevent library (MFSA 2017-11, MFSA 2017-12)2017-04-19
Ubuntu
libevent vulnerabilities2017-03-13
Red Hat
libevent: Stack-buffer overflow in the name_parse() function2016-01-27
Debian
CVE-2016-10195: libevent - The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote a...2016

💬Community

3
Bugzilla
3 public security flaws in libevent, which may affect mozilla products2017-03-01
Bugzilla
CVE-2016-10195 libevent: Stack-buffer overflow in the name_parse() function2017-02-02
Bugzilla
CVE-2016-10195 CVE-2016-10196 CVE-2016-10197 libevent: various flaws [fedora-all]2017-02-02