### [CVE-2016-10196](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument. ### POC #### Reference - https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5 - https://github.com/libevent/libevent/issues/318 - https://www.mozilla.org/security/advisories/mfsa2017-12/ #### Github No PoCs found on GitHub currently.