GNU Libidn 0.3.1

CPE Details

GNU Libidn 0.3.1
0.3.1
2022-01-31
13h41 +00:00
2022-01-31
13h42 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gnu:libidn:0.3.1:*:*:*:*:*:*:*

Informations

Vendor

gnu

Product

libidn

Version

0.3.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2015-8948 2016-09-07 18h00 +00:00 idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
7.5
High
CVE-2016-6261 2016-09-07 18h00 +00:00 The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
7.5
High
CVE-2016-6262 2016-09-07 18h00 +00:00 idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
7.5
High
CVE-2016-6263 2016-09-07 18h00 +00:00 The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
7.5
High
CVE-2015-2059 2015-08-12 12h00 +00:00 The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
7.5