CVE-2016-2195

NameCVE-2016-2195
DescriptionInteger overflow in the PointGFp constructor in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to overwrite memory and possibly execute arbitrary code via a crafted ECC point, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-449-1, DSA-3565-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
botan1.10 (PTS)wheezy1.10.5-1vulnerable
wheezy (security)1.10.5-1+deb7u4fixed
jessie1.10.8-2+deb8u1fixed
jessie (security)1.10.8-2+deb8u2fixed
stretch1.10.16-1fixed
buster, sid1.10.17-0.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
botan1.10source(unstable)1.10.12-1high
botan1.10sourcejessie1.10.8-2+deb8u1highDSA-3565-1
botan1.10sourcewheezy1.10.5-1+deb7u1highDLA-449-1

Notes

Introduced in 1.9.18, fixed in 1.11.27 and 1.10.11
http://botan.randombit.net/security.html

Search for package or bug name: Reporting problems