CVE-2016-10195

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-10195
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10195.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-10195
Downstream
Related
Published
2017-03-15T15:59:00Z
Modified
2025-10-13T05:35:41.031327Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The nameparse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the labellen variable, which triggers an out-of-bounds stack read.

References

Affected packages

Git / github.com/libevent/libevent

Affected ranges

Type
GIT
Repo
https://github.com/libevent/libevent
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

release-1.*

release-1.1b

release-2.*

release-2.0.1-alpha
release-2.0.10-stable
release-2.0.11-stable
release-2.0.12-stable
release-2.0.13-stable
release-2.0.14-stable
release-2.0.15-stable
release-2.0.16-stable
release-2.0.17-stable
release-2.0.18-stable
release-2.0.19-stable
release-2.0.20-stable
release-2.0.21-stable
release-2.0.3-alpha
release-2.0.4-alpha
release-2.0.5-beta
release-2.0.6-rc
release-2.0.7-rc
release-2.0.8-rc
release-2.0.9-rc
release-2.1.1-alpha
release-2.1.2-alpha
release-2.1.3-alpha
release-2.1.4-alpha
release-2.1.5-beta

Database specific

{
    "vanir_signatures": [
        {
            "deprecated": false,
            "id": "CVE-2016-10195-3b821893",
            "signature_version": "v1",
            "digest": {
                "length": 877.0,
                "function_hash": "230810917948425696078014435790478542403"
            },
            "signature_type": "Function",
            "target": {
                "function": "name_parse",
                "file": "evdns.c"
            },
            "source": "https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d"
        },
        {
            "deprecated": false,
            "id": "CVE-2016-10195-87e11fd7",
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "106612348666783545995288764119330317910",
                    "99528596204269176743159437588130556516",
                    "276937442475470391917172913239826145816",
                    "317810233472634170587977236046065416806",
                    "290818586757130838086385828498896856792",
                    "91027287075917707334482351230775769010",
                    "181903107053888778292821972103149648024",
                    "197407190961813361629789264615431293682"
                ],
                "threshold": 0.9
            },
            "signature_type": "Line",
            "target": {
                "file": "evdns.c"
            },
            "source": "https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d"
        }
    ]
}