9.8
CVSSv3

CVE-2016-6293

Published: 25/07/2016 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) up to and including 57.1 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.

Vulnerable Product Search on Vulmon Subscribe to Product

icu-project international components for unicode

Vendor Advisories

Debian Bug report logs - #838694 icu: CVE-2016-7415: Stack based buffer overflow in locidcpp Package: src:icu; Maintainer for src:icu is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 23 Sep 2016 17:27:01 UTC Severity: important Tags: security, upstream F ...
Several security issues were fixed in ICU ...
Several vulnerabilities were discovered in the International Components for Unicode (ICU) library CVE-2014-9911 Michele Spagnuolo discovered a buffer overflow vulnerability which might allow remote attackers to cause a denial of service or possibly execute arbitrary code via crafted text CVE-2015-2632 An integer overflow vulnerab ...
The uloc_acceptLanguageFromHTTP function in common/uloccpp in International Components for Unicode (ICU) through 571 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call ...