CVE-2011-1027

Off-by-one error in the convert_query_hexchar function in html.c in cgit.cgi in cgit before 0.8.3.5 allows remote attackers to cause a denial of service (infinite loop) via a string composed of a % (percent) character followed by invalid hex characters, as demonstrated by a %gg sequence.
References
Link Resource
http://article.gmane.org/gmane.comp.version-control.git/168493 Broken Link
http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e Broken Link Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html Mailing List Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html Mailing List Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html Mailing List
http://openwall.com/lists/oss-security/2011/03/07/3 Mailing List Patch Third Party Advisory
http://secunia.com/advisories/43633 Broken Link Vendor Advisory
http://secunia.com/advisories/43788 Broken Link Vendor Advisory
http://www.osvdb.org/71005 Broken Link
http://www.securityfocus.com/bid/46756 Broken Link Exploit Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0667 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=680905 Exploit Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65919 Third Party Advisory VDB Entry
http://article.gmane.org/gmane.comp.version-control.git/168493 Broken Link
http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e Broken Link Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html Mailing List Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html Mailing List Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html Mailing List
http://openwall.com/lists/oss-security/2011/03/07/3 Mailing List Patch Third Party Advisory
http://secunia.com/advisories/43633 Broken Link Vendor Advisory
http://secunia.com/advisories/43788 Broken Link Vendor Advisory
http://www.osvdb.org/71005 Broken Link
http://www.securityfocus.com/bid/46756 Broken Link Exploit Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0667 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=680905 Exploit Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65919 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:lars_hjemli:cgit:*:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.3:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.4:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.5:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.7:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://article.gmane.org/gmane.comp.version-control.git/168493 - Broken Link () http://article.gmane.org/gmane.comp.version-control.git/168493 - Broken Link
References () http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e - Broken Link, Patch () http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e - Broken Link, Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html - Mailing List, Patch () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html - Mailing List, Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html - Mailing List, Patch () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html - Mailing List, Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html - Mailing List () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html - Mailing List
References () http://openwall.com/lists/oss-security/2011/03/07/3 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2011/03/07/3 - Mailing List, Patch, Third Party Advisory
References () http://secunia.com/advisories/43633 - Broken Link, Vendor Advisory () http://secunia.com/advisories/43633 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/43788 - Broken Link, Vendor Advisory () http://secunia.com/advisories/43788 - Broken Link, Vendor Advisory
References () http://www.osvdb.org/71005 - Broken Link () http://www.osvdb.org/71005 - Broken Link
References () http://www.securityfocus.com/bid/46756 - Broken Link, Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/46756 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2011/0667 - Broken Link () http://www.vupen.com/english/advisories/2011/0667 - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=680905 - Exploit, Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=680905 - Exploit, Issue Tracking, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65919 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/65919 - Third Party Advisory, VDB Entry

22 Dec 2023, 18:50

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
CWE CWE-189 CWE-193
References (CONFIRM) http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e - Patch (CONFIRM) http://hjemli.net/git/cgit/commit/?h=stable&id=fc384b16fb9787380746000d3cea2d53fccc548e - Broken Link, Patch
References (OSVDB) http://www.osvdb.org/71005 - (OSVDB) http://www.osvdb.org/71005 - Broken Link
References (MLIST) http://openwall.com/lists/oss-security/2011/03/07/3 - Patch (MLIST) http://openwall.com/lists/oss-security/2011/03/07/3 - Mailing List, Patch, Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html - Patch (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055898.html - Mailing List, Patch
References (MLIST) http://article.gmane.org/gmane.comp.version-control.git/168493 - (MLIST) http://article.gmane.org/gmane.comp.version-control.git/168493 - Broken Link
References (SECUNIA) http://secunia.com/advisories/43633 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/43633 - Broken Link, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2011/0667 - (VUPEN) http://www.vupen.com/english/advisories/2011/0667 - Broken Link
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055966.html - Mailing List
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=680905 - Exploit, Patch (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=680905 - Exploit, Issue Tracking, Patch
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html - Patch (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055896.html - Mailing List, Patch
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/65919 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/65919 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/43788 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/43788 - Broken Link, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/46756 - Exploit (BID) http://www.securityfocus.com/bid/46756 - Broken Link, Exploit, Third Party Advisory, VDB Entry

Information

Published : 2011-03-20 02:00

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1027

Mitre link : CVE-2011-1027

CVE.ORG link : CVE-2011-1027


JSON object : View

Products Affected

fedoraproject

  • fedora

lars_hjemli

  • cgit
CWE
CWE-193

Off-by-one Error