Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-6272

Опубликовано: 05 янв. 2015
Источник: redhat
CVSS2: 5.1

Описание

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4nfs-utilsWill not fix
Red Hat Enterprise Linux 4openmpiWill not fix
Red Hat Enterprise Linux 5firefoxWill not fix
Red Hat Enterprise Linux 5libeventWill not fix
Red Hat Enterprise Linux 5openmpiNot affected
Red Hat Enterprise Linux 5thunderbirdWill not fix
Red Hat Enterprise Linux 6chromium-browserWill not fix
Red Hat Enterprise Linux 6firefoxWill not fix
Red Hat Enterprise Linux 6libeventWill not fix
Red Hat Enterprise Linux 6openmpiNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-122
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=1144646libevent: potential heap overflow in buffer/bufferevent APIs

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

nvd
около 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

debian
около 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x befor ...

github
больше 3 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

fstec
около 10 лет назад

Уязвимости библиотеки Libevent, позволяющие нарушителю вызвать отказ в обслуживании

5.1 Medium

CVSS2