CVE-2016-10129
moderate-risk
Published 2017-03-24
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
Do I need to act?
~
4.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (4)
Libgit2
Libgit2
Libgit2
Libgit2
Affected Vendors
References (18)
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
44
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
8/34 · Low
Exposure
10/34 · Low