[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:89050867
This update for libidn2 to version 2.2.0 fixes the following issues: - CVE-2019-12290: Fixed an improper round-trip check when converting A-labels to U-labels . - CVE-2019-18224: Fixed a heap-based buffer overflow that was caused by long domain strings .

oval:org.secpod.oval:def:117262
Libidn2 is an implementation of the IDNA2008 specifications in RFC 5890, 5891, 5892 and 5893 for internationalized domain names . It is a standalone library, without any dependency on libidn.

oval:org.secpod.oval:def:1601085
idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string. GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances f ...

oval:org.secpod.oval:def:117259
Libidn2 is an implementation of the IDNA2008 specifications in RFC 5890, 5891, 5892 and 5893 for internationalized domain names . It is a standalone library, without any dependency on libidn.

oval:org.secpod.oval:def:705256
libidn2: Internationalized domain names command line tool Several security issues were fixed in Libidn2.

oval:org.secpod.oval:def:59607
libidn2: Internationalized domain names command line tool Several security issues were fixed in Libidn2.

oval:org.secpod.oval:def:69803
A heap-based buffer overflow vulnerability was discovered in the idn2_to_ascii_4i function in libidn2-dev, the GNU library for Internationalized Domain Names , which could result in denial of service, or the execution of arbitrary code when processing a long domain string.

oval:org.secpod.oval:def:2105261
idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.

oval:org.secpod.oval:def:604732
A heap-based buffer overflow vulnerability was discovered in the idn2_to_ascii_4i function in libidn2, the GNU library for Internationalized Domain Names , which could result in denial of service, or the execution of arbitrary code when processing a long domain string.

oval:org.secpod.oval:def:1700285
heap-based buffer overflow in idn2_to_ascii_4i in lib/lookup.c idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.

CPE    1
cpe:/a:gnu:libidn2
CWE    1
CWE-787
*CVE
CVE-2019-18224

© SecPod Technologies