CVE-2016-10195

Source
https://cve.org/CVERecord?id=CVE-2016-10195
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10195.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-10195
Downstream
Related
Published
2017-03-15T15:59:00.390Z
Modified
2026-04-11T19:42:49.797216Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The nameparse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the labellen variable, which triggers an out-of-bounds stack read.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "cpe": "cpe:2.3:a:libevent_project:libevent:*:*:*:*:*:*:*:*",
            "extracted_events": [
                {
                    "last_affected": "2.1.5"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ]
        }
    ]
}
References

Affected packages

Git / github.com/libevent/libevent

Affected ranges

Type
GIT
Repo
https://github.com/libevent/libevent
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Database specific
{
    "source": [
        "DESCRIPTION",
        "REFERENCES"
    ],
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.1.6-beta"
        }
    ]
}

Affected versions

release-1.*
release-1.1b
release-2.*
release-2.0.1-alpha
release-2.0.10-stable
release-2.0.3-alpha
release-2.0.4-alpha
release-2.0.5-beta
release-2.0.6-rc
release-2.0.7-rc
release-2.0.8-rc
release-2.0.9-rc
release-2.1.1-alpha
release-2.1.2-alpha
release-2.1.3-alpha
release-2.1.4-alpha
release-2.1.5-beta

Database specific

vanir_signatures_modified
"2026-04-11T19:42:49Z"
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10195.json"
vanir_signatures
[
    {
        "target": {
            "function": "name_parse",
            "file": "evdns.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 877.0,
            "function_hash": "230810917948425696078014435790478542403"
        },
        "id": "CVE-2016-10195-3b821893",
        "source": "https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d",
        "signature_type": "Function"
    },
    {
        "target": {
            "file": "evdns.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "106612348666783545995288764119330317910",
                "99528596204269176743159437588130556516",
                "276937442475470391917172913239826145816",
                "317810233472634170587977236046065416806",
                "290818586757130838086385828498896856792",
                "91027287075917707334482351230775769010",
                "181903107053888778292821972103149648024",
                "197407190961813361629789264615431293682"
            ]
        },
        "id": "CVE-2016-10195-87e11fd7",
        "source": "https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d",
        "signature_type": "Line"
    }
]