Integer overflow in the PointGFp constructor in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to overwrite memory and possibly execute arbitrary code via a crafted ECC point, which triggers a heap-based buffer overflow.
                
            References
                    | Link | Resource | 
|---|---|
| http://botan.randombit.net/security.html | Vendor Advisory | 
| http://marc.info/?l=botan-devel&m=145435148602911&w=2 | Vendor Advisory | 
| http://www.debian.org/security/2016/dsa-3565 | |
| https://security.gentoo.org/glsa/201612-38 | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2016-05-13 14:59
Updated : 2017-07-01 01:29
NVD link : CVE-2016-2195
Mitre link : CVE-2016-2195
CVE.ORG link : CVE-2016-2195
JSON object : View
Products Affected
                botan_project
- botan
 
debian
- debian_linux
 
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
