Vulnerability Description
The append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.3 allows remote attackers to cause a denial of service (out-of-bounds read) by clearing the high bit of the byte after invalid utf-8 encoded data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnupg | Libksba | <= 1.3.2 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec6
- http://www.openwall.com/lists/oss-security/2016/04/29/5
- http://www.openwall.com/lists/oss-security/2016/04/29/8
- http://www.openwall.com/lists/oss-security/2016/05/10/3
- http://www.ubuntu.com/usn/USN-2982-1
- https://security.gentoo.org/glsa/201604-04
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec6
- http://www.openwall.com/lists/oss-security/2016/04/29/5
- http://www.openwall.com/lists/oss-security/2016/04/29/8
- http://www.openwall.com/lists/oss-security/2016/05/10/3
- http://www.ubuntu.com/usn/USN-2982-1
- https://security.gentoo.org/glsa/201604-04
FAQ
What is CVE-2016-4356?
CVE-2016-4356 is a vulnerability with a CVSS score of 7.5 (HIGH). The append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.3 allows remote attackers to cause a denial of service (out-of-bounds read) by clearing the high bit of the byte after inv...
How severe is CVE-2016-4356?
CVE-2016-4356 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4356?
Check the references section above for vendor advisories and patch information. Affected products include: Gnupg Libksba, Canonical Ubuntu Linux.