{"id":"CVE-2016-9427","details":"Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.","modified":"2026-04-16T06:17:19.351275756Z","published":"2016-12-12T02:59:16.840Z","related":["SUSE-SU-2016:3057-1"],"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/18/3"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94407"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00039.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-12/msg00089.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-12/msg00115.html"},{"type":"FIX","url":"https://github.com/ivmai/bdwgc/issues/135"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ivmai/bdwgc","events":[{"introduced":"0"},{"last_affected":"d8bfa89c2a9c7c86fb98acbc53b5750600b95492"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.4.4"}]}}],"versions":["gc4_1","gc4_10","gc4_10t3","gc4_11","gc4_12","gc4_13","gc4_14","gc4_14alpha1","gc4_8","gc5_0alpha3","gc5_3","gc6_0","gc6_1","gc6_1alpha4","gc6_2","gc6_3","gc6_3alpha1","gc6_3alpha4","gc6_3alpha5","gc6_4","gc7_0","gc7_0alpha1","gc7_0alpha2","gc7_0alpha3","gc7_0alpha4","gc7_0alpha5","gc7_0alpha7","gc7_0alpha9","gc7_1","gc7_1alpha2","gc7_1alpha3-20080220","gc7_1alpha3-20080224","gc7_2alpha2","gc7_2alpha4","gc7_2alpha5-20110107","gc7_2alpha6","gc7_3alpha2","gc7_4_0","gc7_4_2","gc7_4_4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9427.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"42.2"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}