{"id":"CVE-2016-4478","details":"Buffer overflow in the xmlrpc_char_encode function in modules/transport/xmlrpc/xmlrpclib.c in Atheme before 7.2.7 allows remote attackers to cause a denial of service via vectors related to XMLRPC response encoding.","modified":"2026-04-11T03:43:48.774314Z","published":"2016-06-13T19:59:09.020Z","related":["openSUSE-SU-2024:10515-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00061.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/05/02/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/05/03/1"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3586"},{"type":"FIX","url":"https://github.com/atheme/atheme/commit/87580d767868360d2fed503980129504da84b63e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/atheme/atheme","events":[{"introduced":"0"},{"last_affected":"c961688c910803158202b27d4b9237acb100f251"},{"fixed":"87580d767868360d2fed503980129504da84b63e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.2.6"}]}}],"versions":["atheme-6.0.0-alpha1","atheme-7.2.0","atheme-7.2.0-beta1","atheme-7.2.0-beta2","atheme-7.2.0-rc1","atheme-7.2.0-rc2","atheme-7.2.1","atheme-7.2.2","atheme-7.2.3","atheme-7.2.4","atheme-7.2.5","atheme-7.2.6","atheme-services-3.0.0","atheme-services-3.0.1","atheme-services-3.0.2","atheme-services-3.0.3","atheme-services-4.0.0","atheme-services-4.0.1","atheme-services-5.0","atheme-services-5.0-beta1","atheme-services-5.0.1","atheme-services-5.1-rc1","atheme-services-5.1.0","atheme-services-5.1.1","atheme-services-5.2.0","atheme-services-6.0.0","atheme-services-6.0.0-alpha2","atheme-services-6.0.0-alpha3","atheme-services-6.0.0-alpha6","atheme-services-6.0.0-alpha7","atheme-services-6.0.0-beta1","atheme-services-6.0.0-beta2","atheme-services-6.0.0-beta3","atheme-services-6.0.0-rc1","atheme-services-6.0.0-rc2","atheme-services-7.0-alpha1","atheme-services-7.0.0-alpha10","atheme-services-7.0.0-alpha11","atheme-services-7.0.0-alpha13","atheme-services-7.0.0-alpha13.37","atheme-services-7.0.0-alpha14","atheme-services-7.0.0-alpha2","atheme-services-7.0.0-alpha3","atheme-services-7.0.0-alpha6","atheme-services-7.0.0-alpha7","atheme-services-7.0.0-alpha8","atheme-services-7.0.0-alpha9","atheme-services-7.0.0-beta1","atheme-services-7.0.0-beta2","atheme-services-7.1.0-alpha1"],"database_specific":{"vanir_signatures":[{"target":{"file":"modules/transport/xmlrpc/xmlrpclib.c"},"deprecated":false,"source":"https://github.com/atheme/atheme/commit/87580d767868360d2fed503980129504da84b63e","signature_type":"Line","id":"CVE-2016-4478-34f02fe3","digest":{"threshold":0.9,"line_hashes":["42205439419379173217561027574847435756","279842839254015645750451448363378502239","130012205762668577428285411191529094442","83917961357696884801576035593535001229","211077350756679990206601574942213543167"]},"signature_version":"v1"},{"target":{"file":"modules/transport/xmlrpc/xmlrpclib.c","function":"xmlrpc_char_encode"},"deprecated":false,"source":"https://github.com/atheme/atheme/commit/87580d767868360d2fed503980129504da84b63e","signature_type":"Function","id":"CVE-2016-4478-c2d77b15","digest":{"function_hash":"291135090142418443225470849783248172328","length":795},"signature_version":"v1"}],"vanir_signatures_modified":"2026-04-11T03:43:48Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4478.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}