CVE-2016-10196 PUBLISHED

Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.

EPSS 1.06% · 77.5th percentile

Risk Scores

EPSS Score
1.06%
77.5th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlibevent2.0.21-stable-1ubuntu1.14.04.1, 2.0.21-stable-1ubuntu1, 2.0.21-stable-1
Ubuntu:14.04:LTSfirefox37.0+build2-0ubuntu0.14.04.1, 37.0.1+build1-0ubuntu0.14.04.1, 0
Ubuntu:16.04:LTSlibevent2.0.21-stable-2, 0
Ubuntu:16.04:LTSthunderbird1:38.8.0+build1-0ubuntu0.16.04.1, 1:38.7.2+build1-0ubuntu0.16.04.1, 1:38.6.0+build1-0ubuntu1
Ubuntu:14.04:LTSthunderbird1:38.3.0+build1-0ubuntu0.14.04.1, 0, 1:24.0+build1-0ubuntu1
Ubuntu:16.04:LTSfirefox49.0.2+build2-0ubuntu0.16.04.2, 50.0+build2-0ubuntu0.16.04.2, 50.0.2+build1-0ubuntu0.16.04.1

Timeline

References

Open in Interactive Console →