Vulnerabilities > CVE-2016-4021 - Resource Management Errors vulnerability in multiple products

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
fedoraproject
pgpdump-project
CWE-399
nessus

Summary

The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-768.NASL
    descriptionThe read_binary function in buffer.c in pgpdump, a PGP packet visualizer, allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input. This was assigned CVE-2016-4021. Also, the read_radix64 function the might read data from beyond the end of a buffer from crafted input. For Debian 7
    last seen2020-03-17
    modified2017-01-03
    plugin id96184
    published2017-01-03
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/96184
    titleDebian DLA-768-1 : pgpdump security update
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Debian Security Advisory DLA-768-1. The text
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(96184);
      script_version("3.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2016-4021");
    
      script_name(english:"Debian DLA-768-1 : pgpdump security update");
      script_summary(english:"Checks dpkg output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The read_binary function in buffer.c in pgpdump, a PGP packet
    visualizer, allows context-dependent attackers to cause a denial of
    service (infinite loop and CPU consumption) via crafted input. This
    was assigned CVE-2016-4021.
    
    Also, the read_radix64 function the might read data from beyond the
    end of a buffer from crafted input.
    
    For Debian 7 'Wheezy', these problems have been fixed in version
    0.27-1+deb7u1.
    
    For Debian 8 'Jessie', these problems will be fixed in version
    0.28-1+deb8u1, part of the upcoming point release
    
    For Debian 9 'Stretch' and 'Sid', these problems have been fixed in
    version 0.31-0.1
    
    We recommend that you upgrade your pgpdump packages.
    
    NOTE: Tenable Network Security has extracted the preceding description
    block directly from the DLA security advisory. Tenable has attempted
    to automatically clean and format it as much as possible without
    introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.debian.org/debian-lts-announce/2016/12/msg00045.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/pgpdump"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Upgrade the affected pgpdump package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:pgpdump");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2016/12/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/01/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"pgpdump", reference:"0.27-1+deb7u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2016-6FD7A31D36.NASL
    descriptionCVE-2016-4021 pgpdump: endless loop parsing specially crafted input Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2016-05-12
    plugin id91064
    published2016-05-12
    reporterThis script is Copyright (C) 2016-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/91064
    titleFedora 22 : pgpdump-0.30-1.fc22 (2016-6fd7a31d36)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2016-5733AD20F5.NASL
    descriptionCVE-2016-4021 pgpdump: endless loop parsing specially crafted input Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2016-05-12
    plugin id91061
    published2016-05-12
    reporterThis script is Copyright (C) 2016-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/91061
    titleFedora 23 : pgpdump-0.30-1.fc23 (2016-5733ad20f5)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2016-8F4B54B005.NASL
    descriptionCVE-2016-4021 pgpdump: endless loop parsing specially crafted input Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2016-05-09
    plugin id90964
    published2016-05-09
    reporterThis script is Copyright (C) 2016-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/90964
    titleFedora 24 : pgpdump-0.30-1.fc24 (2016-8f4b54b005)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/136727/SYSS-2016-030.txt
idPACKETSTORM:136727
last seen2016-12-05
published2016-04-18
reporterKlaus Eisentraut
sourcehttps://packetstormsecurity.com/files/136727/pgpdump-0.29-Endless-Loop.html
titlepgpdump 0.29 Endless Loop