First published: Thu May 26 2016(Updated: )
The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =22 | |
Fedora | =23 | |
Fedora | =24 | |
pgpdump | <=0.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4021 has been classified as a denial of service vulnerability due to its ability to cause CPU exhaustion.
To mitigate CVE-2016-4021, upgrade pgpdump to version 0.30 or later.
CVE-2016-4021 affects pgpdump versions prior to 0.30 and Fedora releases 22, 23, and 24.
CVE-2016-4021 can lead to an infinite loop and excessive CPU consumption, potentially disrupting service availability.
CVE-2016-4021 can be exploited by context-dependent attackers using specially crafted input.