First published: Wed Sep 07 2016(Updated: )
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.1 | |
GNU libidn | <=1.32 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 |
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6261 has been classified as a denial of service vulnerability.
To fix CVE-2016-6261, you should upgrade libidn to version 1.33 or later.
CVE-2016-6261 affects libidn versions prior to 1.33.
Yes, CVE-2016-6261 can be exploited by context-dependent attackers without needing physical access.
CVE-2016-6261 affects OpenSUSE Leap 42.1 and various versions of Ubuntu Linux (12.04, 14.04, and 16.04).