CVE-2016-10161

CVE-2016-10161

The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.

Source: CVE-2016-10161

CVE-2016-10158

CVE-2016-10158

The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.

Source: CVE-2016-10158

CVE-2016-10162

CVE-2016-10162

The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.

Source: CVE-2016-10162

CVE-2017-5495 (quagga)

CVE-2017-5495 (quagga)

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet ‘vty’ CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface ‘vty’ input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.

Source: CVE-2017-5495 (quagga)

CVE-2017-2970 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

CVE-2017-2970 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the XSLT engine related to template manipulation. Successful exploitation could lead to arbitrary code execution.

Source: CVE-2017-2970 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

CVE-2017-2971 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

CVE-2017-2971 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the JPEG decoder routine. Successful exploitation could lead to arbitrary code execution.

Source: CVE-2017-2971 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

CVE-2017-2972 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

CVE-2017-2972 (acrobat, acrobat_dc, acrobat_reader_dc, reader)

Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module related to JPEG parsing. Successful exploitation could lead to arbitrary code execution.

Source: CVE-2017-2972 (acrobat, acrobat_dc, acrobat_reader_dc, reader)