Critical severity9.8NVD Advisory· Published Jan 30, 2017· Updated May 13, 2026
CVE-2016-9132
CVE-2016-9132
Description
In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed. Some API callers may use the returned (incorrect and attacker controlled) length field in a way which later causes memory corruption or other failure.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/randombit/botan/commit/987ad747db6d0d7e36f840398f3cf02e2fbfd90fnvdPatch
- www.securityfocus.com/bid/95879nvdThird Party AdvisoryVDB Entry
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OUDGVRQYQUL7F5MRP3LAV7EHRJG4BBE/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2Y3JLMTE3VIV4X5X6SXVZTJBDDLCS3D/nvd
News mentions
0No linked articles in our index yet.