Integer overflow in the PointGFp constructor in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to overwrite memory and possibly execute arbitrary code via a crafted ECC point, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://botan.randombit.net/security.html | Vendor Advisory |
http://marc.info/?l=botan-devel&m=145435148602911&w=2 | Vendor Advisory |
http://www.debian.org/security/2016/dsa-3565 | |
https://security.gentoo.org/glsa/201612-38 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2016-05-13 07:59
Updated : 2017-06-30 18:29
NVD link : CVE-2016-2195
Mitre link : CVE-2016-2195
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
debian
- debian_linux
botan_project
- botan