7.5
CVSSv2

CVE-2016-10128

Published: 24/03/2017 Updated: 28/03/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 prior to 0.24.6 and 0.25.x prior to 0.25.1 allows remote malicious users to have unspecified impact via a crafted non-flush packet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libgit2 project libgit2 0.25.0

libgit2 project libgit2

Vendor Advisories

Debian Bug report logs - #851406 libgit2: CVE-2016-10128 CVE-2016-10129 CVE-2016-10130 Package: src:libgit2; Maintainer for src:libgit2 is Russell Sim <russellsim@gmailcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 14 Jan 2017 15:54:05 UTC Severity: important Tags: confirmed, jessie, patch, ...
Each packet line in the Git protocol is prefixed by a four-byte length of how much data will follow, which we parse in `git_pkt_parse_line` The transmitted length can either be equal to zero in case of a flush packet or has to be at least of length four, as it also includes the encoded length itself Not checking this may result in a buffer overfl ...