{ "schema_version": "1.4.0", "id": "GHSA-5xfq-6ph6-q9hw", "modified": "2022-05-17T03:53:15Z", "published": "2022-05-17T03:53:15Z", "aliases": [ "CVE-2016-4021" ], "details": "The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \\xa3\\x03 string.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4021" }, { "type": "WEB", "url": "https://github.com/kazu-yamamoto/pgpdump/pull/16" }, { "type": "WEB", "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html" }, { "type": "WEB", "url": "http://seclists.org/bugtraq/2016/Apr/99" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-26T14:59:00Z" } }