Vulnerability Description
The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Libevent Project | Libevent | <= 2.1.5 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3789Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/01/31/17Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/02/7Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/96014Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038320Broken LinkThird Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1104Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1106Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1201Third Party Advisory
- https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLogRelease NotesThird Party Advisory
- https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecPatchThird Party Advisory
- https://github.com/libevent/libevent/issues/332ExploitIssue TrackingThird Party Advisory
- https://security.gentoo.org/glsa/201705-01Third Party Advisory
- http://www.debian.org/security/2017/dsa-3789Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/01/31/17Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/02/7Mailing ListThird Party Advisory
FAQ
What is CVE-2016-10197?
CVE-2016-10197 is a vulnerability with a CVSS score of 7.5 (HIGH). The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.
How severe is CVE-2016-10197?
CVE-2016-10197 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10197?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Libevent Project Libevent.