Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-6272

Опубликовано: 24 авг. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5

Описание

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

РелизСтатусПримечание
devel

not-affected

2.0.21-stable-2
esm-infra-legacy/trusty

released

2.0.21-stable-1ubuntu1.14.04.1
lucid

released

1.4.13-stable-1ubuntu0.1
precise

released

2.0.16-stable-1ubuntu0.1
trusty

released

2.0.21-stable-1ubuntu1.14.04.1
trusty/esm

released

2.0.21-stable-1ubuntu1.14.04.1
upstream

released

1.4.15,2.0.22
utopic

released

2.0.21-stable-1ubuntu1.14.10.1

Показывать по

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

nvd
около 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

debian
около 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x befor ...

github
больше 3 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

fstec
около 10 лет назад

Уязвимости библиотеки Libevent, позволяющие нарушителю вызвать отказ в обслуживании

7.5 High

CVSS2