CVE-2016-10196

Priority
Medium
Description
Stack-based buffer overflow in the evutil_parse_sockaddr_port function in
evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial
of service (segmentation fault) via vectors involving a long string in
brackets in the ip_as_string argument.
References
Bugs
Package
Upstream:released (52.1.1)
Ubuntu 17.10 (Artful Aardvark):released (1:52.1.1+build1-0ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (1:52.1.1+build1-0ubuntu0.14.04.1)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:52.1.1+build1-0ubuntu0.16.04.1)
Ubuntu 17.04 (Zesty Zapus):released (1:52.1.1+build1-0ubuntu0.17.04.1)
Package
Upstream:released (53.0)
Ubuntu 17.10 (Artful Aardvark):released (54.0+build3-0ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was ignored)
Ubuntu 14.04 LTS (Trusty Tahr):released (53.0+build6-0ubuntu0.14.04.1)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (53.0+build6-0ubuntu0.16.04.1)
Ubuntu 17.04 (Zesty Zapus):released (53.0+build6-0ubuntu0.17.04.1)
Package
Upstream:released (2.0.21-stable-3)
Ubuntu 17.10 (Artful Aardvark):released (2.0.21-stable-3)
Ubuntu 12.04 ESM (Precise Pangolin):released (2.0.16-stable-1ubuntu0.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.0.21-stable-1ubuntu1.14.04.2)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.0.21-stable-2ubuntu0.16.04.1)
Ubuntu 17.04 (Zesty Zapus):released (2.0.21-stable-3)
Patches:
Upstream:https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5
More Information

Updated: 2017-08-15 21:14:14 UTC (commit 13105)