1 results (0.001 seconds)

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 2

The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string. La función read_binary en buffer.c en pgpdump en versiones anteriores a 0.30 permite a atacantes dependientes del contexto provocar una denegación de servicio (bucle infinito y consumo de CPU) a través de una entrada manipulada, según lo demostrado por la cadena \xa3\x03. pgpdump version 0.29 suffers from an endless loop parsing issue that can lead to a denial of service. • http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html http://seclists.org/bugtraq/2016/Apr/99 https://github.com/kazu-yamamoto/pgpdump/pull/16 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt • CWE-399: Resource Management Errors •