Closed mend-for-github-com[bot] closed 1 year ago
:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #79
:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #79
Vulnerable Library - Libeventrelease-2.0.22-stable
Event notification library
Library home page: https://github.com/nmathewson/Libevent.git
Found in HEAD commit: 0c45ce909374d16605095db4fce9a89b9b6bafd5
Vulnerable Source Files (1)
/release/src/router/lldpd-0.9.8/libevent/evutil.c
Vulnerabilities
Details
CVE-2016-10196
### Vulnerable Library - Libeventrelease-2.0.22-stableEvent notification library
Library home page: https://github.com/nmathewson/Libevent.git
Found in HEAD commit: 0c45ce909374d16605095db4fce9a89b9b6bafd5
Found in base branch: master
### Vulnerable Source Files (1)/release/src/router/lldpd-0.9.8/libevent/evutil.c
### Vulnerability DetailsStack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.
Publish Date: 2017-03-15
URL: CVE-2016-10196
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://gitlab.alpinelinux.org/alpine/aports/issues/6797
Release Date: 2017-03-15
Fix Resolution: 2.1.6