{"id":"CVE-2016-2194","details":"The ressol function in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to cause a denial of service (infinite loop) via unspecified input to the OS2ECP function, related to a composite modulus.","modified":"2026-04-16T06:17:18.138661077Z","published":"2016-05-13T14:59:07.697Z","related":["SUSE-SU-2017:1222-1","openSUSE-SU-2024:10477-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3565"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-38"},{"type":"ADVISORY","url":"http://botan.randombit.net/security.html"},{"type":"ADVISORY","url":"http://marc.info/?l=botan-devel&m=145435148602911&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=botan-devel&m=145449001708138&w=2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/randombit/botan","events":[{"introduced":"0"},{"last_affected":"ee912cd748a9b0bf56c84a49896dd2d57e0f81a6"},{"introduced":"0"},{"last_affected":"0f301b1bc6ec4dcb4626cf7050c300abe1fef814"},{"introduced":"0"},{"last_affected":"c6147dcfb05a8df25ed74253b0a7e768fae19158"},{"introduced":"0"},{"last_affected":"bcee79d0d4dff8c0cbe4d753171359d565aca9c7"},{"introduced":"0"},{"last_affected":"822daab5f8392e9b8a2e219991f8adeffd101da9"},{"introduced":"0"},{"last_affected":"260de31d40e36239c7a27520ab0f7fbe0c3c90b4"},{"introduced":"0"},{"last_affected":"6a5c0019c5976226c9b4c80bca3aff70efb82897"},{"introduced":"0"},{"last_affected":"c691530064534882c7f43d996bb200e0c8d3d57f"},{"introduced":"0"},{"last_affected":"9241078d8797433779600b08fed5313dc30f3a76"},{"introduced":"0"},{"last_affected":"a69436e3cb4b91ec835673145fd4dbe703342a4c"},{"introduced":"0"},{"last_affected":"746844ba82d7c1b8e80dcda3da779fcc1bb495a3"},{"introduced":"0"},{"last_affected":"c78b2e26875a8726d0ac7a10af2c86b57860d3fb"},{"introduced":"0"},{"last_affected":"bfaeed3848727c4f8e7ac71ff886360d0f4b19a1"},{"introduced":"0"},{"last_affected":"e05de6c4c5c37e66f89394019dd1045b7a2f8af0"},{"introduced":"0"},{"last_affected":"a9aebb6c08eb7d78a62283c33ece17b73e7c2f8c"},{"introduced":"0"},{"last_affected":"7489ab66e1814cb6cc0f6b8f7f5f36edc3eb567a"},{"introduced":"0"},{"last_affected":"01226c4ef4eb9be841a65cf6e3ac1c343bd922a6"},{"introduced":"0"},{"last_affected":"0bac9f292b133439311dddb2642bff1041becbd7"},{"introduced":"0"},{"last_affected":"e27b169d4cebfc9c80e3b9cd273cb355969a877e"},{"introduced":"0"},{"last_affected":"22dc8165392711e424efcb2724fd69b1ab68abd5"},{"introduced":"0"},{"last_affected":"2a7a4a77cb6af113fc3251960554b96b332edc86"},{"introduced":"0"},{"last_affected":"1ed5d9e990353e5d4f1b8dcf42afc143b0abe933"},{"introduced":"0"},{"last_affected":"3d253c524e3e4f21a11c857ab0827fe34c2ee307"},{"introduced":"0"},{"last_affected":"1203405e412c0d9b6268046ab342167bb2f5792b"},{"introduced":"0"},{"last_affected":"cb4ab0662dfbe462dbe578ffa7d6f44effa51d82"},{"introduced":"0"},{"last_affected":"91c194957a12b174f4a51f41319b0d9604450d87"},{"introduced":"0"},{"last_affected":"9d3ad9a0f44a9321185ed9f221c828dac81b9f0c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.11.0"},{"introduced":"0"},{"last_affected":"1.11.1"},{"introduced":"0"},{"last_affected":"1.11.2"},{"introduced":"0"},{"last_affected":"1.11.3"},{"introduced":"0"},{"last_affected":"1.11.4"},{"introduced":"0"},{"last_affected":"1.11.5"},{"introduced":"0"},{"last_affected":"1.11.6"},{"introduced":"0"},{"last_affected":"1.11.7"},{"introduced":"0"},{"last_affected":"1.11.8"},{"introduced":"0"},{"last_affected":"1.11.9"},{"introduced":"0"},{"last_affected":"1.11.10"},{"introduced":"0"},{"last_affected":"1.11.11"},{"introduced":"0"},{"last_affected":"1.11.12"},{"introduced":"0"},{"last_affected":"1.11.13"},{"introduced":"0"},{"last_affected":"1.11.14"},{"introduced":"0"},{"last_affected":"1.11.15"},{"introduced":"0"},{"last_affected":"1.11.16"},{"introduced":"0"},{"last_affected":"1.11.17"},{"introduced":"0"},{"last_affected":"1.11.18"},{"introduced":"0"},{"last_affected":"1.11.19"},{"introduced":"0"},{"last_affected":"1.11.20"},{"introduced":"0"},{"last_affected":"1.11.21"},{"introduced":"0"},{"last_affected":"1.11.22"},{"introduced":"0"},{"last_affected":"1.11.23"},{"introduced":"0"},{"last_affected":"1.11.24"},{"introduced":"0"},{"last_affected":"1.11.25"},{"introduced":"0"},{"last_affected":"1.11.26"}]}}],"versions":["1.10.0","1.10.0-rc1","1.10.1","1.11.0","1.11.1","1.11.10","1.11.11","1.11.12","1.11.13","1.11.14","1.11.15","1.11.16","1.11.17","1.11.18","1.11.19","1.11.2","1.11.20","1.11.21","1.11.22","1.11.23","1.11.24","1.11.25","1.11.26","1.11.3","1.11.4","1.11.5","1.11.6","1.11.7","1.11.8","1.11.9","1.5.10","1.5.11","1.5.12","1.5.13","1.5.6","1.5.7","1.5.8","1.5.9","1.6.0","1.6.1","1.7.0","1.7.1","1.7.10","1.7.11","1.7.15","1.7.16","1.7.17","1.7.18","1.7.19","1.7.20","1.7.21","1.7.22","1.7.23","1.7.24","1.7.3","1.7.4","1.7.5","1.7.6","1.7.7","1.7.8","1.7.9","1.8.2","1.8.3","1.8.4","1.8.5","1.8.6","1.8.7","1.8.8","1.9.10","1.9.11","1.9.12","1.9.13","1.9.14","1.9.15","1.9.16","1.9.17","1.9.18","1.9.3","1.9.4","1.9.5","1.9.6","1.9.7","1.9.8","1.9.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2194.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.10.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}