Heap-based buffer overflow in the parse_packet function in network.c in collectd before 5.4.3 and 5.x before 5.5.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted network packet.
[
    {
        "source": "https://github.com/collectd/collectd/commit/b589096f907052b3a4da2b9ccc9b0e2e888dfc18",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "306965870653954072527171272527053320127",
                "73541933529261276942652323967835559474",
                "211364815091471671335292792811151251480",
                "146709269129839664605757152539845208149",
                "306965870653954072527171272527053320127",
                "73541933529261276942652323967835559474",
                "211364815091471671335292792811151251480",
                "146709269129839664605757152539845208149",
                "248286803577515758494005552179336900362",
                "229961056944906683896744944850171760495",
                "218499929594801873617902212803100804529",
                "277685718875055145822524010164517135514"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "src/network.c"
        },
        "id": "CVE-2016-6254-308dc073",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/collectd/collectd/commit/b589096f907052b3a4da2b9ccc9b0e2e888dfc18",
        "signature_version": "v1",
        "digest": {
            "function_hash": "182876792119635883406710209722823110113",
            "length": 4959.0
        },
        "target": {
            "function": "parse_packet",
            "file": "src/network.c"
        },
        "id": "CVE-2016-6254-c3386361",
        "deprecated": false,
        "signature_type": "Function"
    }
]