Heap-based buffer overflow in the parse_packet function in network.c in collectd before 5.4.3 and 5.x before 5.5.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted network packet.
[
{
"id": "CVE-2016-6254-308dc073",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"306965870653954072527171272527053320127",
"73541933529261276942652323967835559474",
"211364815091471671335292792811151251480",
"146709269129839664605757152539845208149",
"306965870653954072527171272527053320127",
"73541933529261276942652323967835559474",
"211364815091471671335292792811151251480",
"146709269129839664605757152539845208149",
"248286803577515758494005552179336900362",
"229961056944906683896744944850171760495",
"218499929594801873617902212803100804529",
"277685718875055145822524010164517135514"
]
},
"target": {
"file": "src/network.c"
},
"source": "https://github.com/collectd/collectd/commit/b589096f907052b3a4da2b9ccc9b0e2e888dfc18",
"signature_type": "Line"
},
{
"id": "CVE-2016-6254-c3386361",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 4959.0,
"function_hash": "182876792119635883406710209722823110113"
},
"target": {
"file": "src/network.c",
"function": "parse_packet"
},
"source": "https://github.com/collectd/collectd/commit/b589096f907052b3a4da2b9ccc9b0e2e888dfc18",
"signature_type": "Function"
}
]