Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2016-2194 CVE-2016-2195 CVE-2016-2196 CVE-2015-5727 CVE-2015-5726 |
CWE-ID | CWE-20 CWE-122 CWE-399 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Fedora Operating systems & Components / Operating system qt-creator Operating systems & Components / Operating system package or component qca Operating systems & Components / Operating system package or component monotone Operating systems & Components / Operating system package or component code-editor Operating systems & Components / Operating system package or component botan Operating systems & Components / Operating system package or component |
Vendor | Fedoraproject |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU40300
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2016-2194
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The ressol function in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to cause a denial of service (infinite loop) via unspecified input to the OS2ECP function, related to a composite modulus.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 22
qt-creator: before 3.6.0-6.fc22
qca: before 2.1.1-4.fc22
monotone: before 1.1-13.fc22
code-editor: before 2.8.1-13.fc22
botan: before 1.10.12-1.fc22
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2016-1c08d77b96
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU40299
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-2195
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the PointGFp constructor in Botan before 1.10.11 and 1.11.x before 1.11.27. A remote attacker can use a crafted ECC point to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 22
qt-creator: before 3.6.0-6.fc22
qca: before 2.1.1-4.fc22
monotone: before 1.1-13.fc22
code-editor: before 2.8.1-13.fc22
botan: before 1.10.12-1.fc22
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2016-1c08d77b96
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU40298
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-2196
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the P-521 reduction function in Botan 1.11.x before 1.11.27. A remote attacker can use unspecified vectors. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 22
qt-creator: before 3.6.0-6.fc22
qca: before 2.1.1-4.fc22
monotone: before 1.1-13.fc22
code-editor: before 2.8.1-13.fc22
botan: before 1.10.12-1.fc22
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2016-1c08d77b96
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU40302
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-5727
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The BER decoder in Botan 1.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, related to a length field.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 22
qt-creator: before 3.6.0-6.fc22
qca: before 2.1.1-4.fc22
monotone: before 1.1-13.fc22
code-editor: before 2.8.1-13.fc22
botan: before 1.10.12-1.fc22
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2016-1c08d77b96
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU40303
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-5726
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The BER decoder in Botan 0.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (application crash) via an empty BIT STRING in ASN.1 data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 22
qt-creator: before 3.6.0-6.fc22
qca: before 2.1.1-4.fc22
monotone: before 1.1-13.fc22
code-editor: before 2.8.1-13.fc22
botan: before 1.10.12-1.fc22
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2016-1c08d77b96
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.