CVE-2016-7151

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-7151
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7151.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-7151
Aliases
Downstream
Published
2019-05-15T14:29:00.530Z
Modified
2025-12-07T09:51:46.134066Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86insnreg_intel in arch/X86/X86Mapping.c.

References

Affected packages

Git / github.com/aquynh/capstone

Affected ranges

Type
GIT
Repo
https://github.com/aquynh/capstone
Events
Introduced
0 Unknown introduced commit / All previous commits are affected

Git / github.com/capstone-engine/capstone

Affected ranges

Type
GIT
Repo
https://github.com/capstone-engine/capstone
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0

2.*

2.0
2.0-rc1
2.1
2.1-rc1
2.1.1
2.1.2

3.*

3.0
3.0-rc1
3.0-rc2
3.0-rc3
3.0.1-rc1
3.0.1-rc2

4.*

4.0-alpha1
4.0-alpha2
4.0-alpha3

Database specific

vanir_signatures

[
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "8568431934240585982139495907372124355",
                "305083470353914768895393270293287726442",
                "321885078504814570267058200137076517654",
                "17213827468853544879361705343455830773",
                "163159936672642813087764874824407803480",
                "4334250100477693983519003650075821085",
                "315956445406849831579525783280224677875",
                "50114894164788415560664358126836875881",
                "236653460035702537018464802408357402721",
                "119137408030478997891546985894575031765",
                "276355777254671461515357086578374023535",
                "223130721480964790784181393700928178694",
                "318091617925766352199419750959837337378",
                "267637130843289763686428534397410691618",
                "293217723645099742500525076716833316650",
                "137554165864511298212221909217631535025",
                "3919371193829264804791298229251240468"
            ]
        },
        "source": "https://github.com/capstone-engine/capstone/commit/87a25bb543c8e4c09b48d4b4a6c7db31ce58df06",
        "id": "CVE-2016-7151-00248af1",
        "deprecated": false,
        "target": {
            "file": "arch/X86/X86Mapping.c"
        },
        "signature_version": "v1",
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "236004703997945582504869253197323457457",
            "length": 813.0
        },
        "source": "https://github.com/capstone-engine/capstone/commit/87a25bb543c8e4c09b48d4b4a6c7db31ce58df06",
        "id": "CVE-2016-7151-8507e2d0",
        "deprecated": false,
        "target": {
            "file": "arch/X86/X86Mapping.c",
            "function": "X86_insn_reg_intel"
        },
        "signature_version": "v1",
        "signature_type": "Function"
    }
]