Your submission was sent successfully! Close

CVE-2016-9132

Published: 30 January 2017

In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed. Some API callers may use the returned (incorrect and attacker controlled) length field in a way which later causes memory corruption or other failure.

From the Ubuntu security team

It was discovered that Botan did not properly decode BER data while parsing untrusted inputs such as X.509 certificates. An attacker could possibly use this issue to cause memory corruption or other failure, resulting in an integer overflow attack.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
botan1.10
Launchpad, Ubuntu, Debian
artful Not vulnerable
(1.10.14-1)
bionic Not vulnerable
(1.10.14-1)
cosmic Not vulnerable
(1.10.14-1)
disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

precise Does not exist
(precise was needed)
trusty Does not exist
(trusty was needed)
upstream
Released (1.10.14-1)
xenial Ignored
(end of standard support, was needed)
yakkety Ignored
(reached end-of-life)
zesty Ignored
(reached end-of-life)
Patches:
upstream: https://github.com/randombit/botan/commit/987ad747db6d0d7e36f840398f3cf02e2fbfd90f
botan1.8
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

precise Does not exist
(precise was needed)
trusty Does not exist

upstream Needed

xenial Does not exist

yakkety Does not exist

zesty Does not exist