Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-6261 |
CWE-ID | CWE-125 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
IBM Tivoli Storage Manager Server applications / File servers (FTP/HTTP) libidn (Alpine package) Operating systems & Components / Operating system package or component |
Vendor |
IBM Corporation Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU32270
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2016-6261
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Tivoli Storage Manager: 6.1.4
libidn (Alpine package): 2.10.7ubuntu3 - 2.10.26ubuntu3
libidn (Alpine package): 0.57
libidn (Alpine package): 1.5.2-10
libidn (Alpine package): 3.0pl1-115ubuntu1 - 3.0pl1-115
libidn (Alpine package): 5.2.1-2 - 5.93-3
libidn (Alpine package): 0.2.3-1
libidn (Alpine package): 0.9.2
libidn (Alpine package): 0.2.5
libidn (Alpine package): 7.3.0.118
libidn (Alpine package):
libidn (Alpine package): before 1.33-r0
CPE2.3https://git.alpinelinux.org/aports/commit/?id=6f8194876e62f69016a55f327bebc773747eb8cc
https://git.alpinelinux.org/aports/commit/?id=33d33f1d2d9ecca84f682b2a549435c8b7ed96ea
https://git.alpinelinux.org/aports/commit/?id=8a25e031b07b773c4abdabe2f55faf44b187ea5a
https://git.alpinelinux.org/aports/commit/?id=812e0313b9eac3e50cd03f0dd965957bbe23fcf1
https://git.alpinelinux.org/aports/commit/?id=87698baa9ec19d0554e5233954b6f266efe8b5cd
https://git.alpinelinux.org/aports/commit/?id=bb2a0351e208d64f3b150cd56e320b0f2e74605a
https://git.alpinelinux.org/aports/commit/?id=ffe337c3cad45e1b559788b0f80573a30530d4c1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.