Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-6272

Опубликовано: 24 авг. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

РелизСтатусПримечание
devel

not-affected

2.0.21-stable-2
esm-infra-legacy/trusty

not-affected

2.0.21-stable-1ubuntu1.14.04.1
lucid

released

1.4.13-stable-1ubuntu0.1
precise

released

2.0.16-stable-1ubuntu0.1
trusty

released

2.0.21-stable-1ubuntu1.14.04.1
trusty/esm

not-affected

2.0.21-stable-1ubuntu1.14.04.1
upstream

released

1.4.15,2.0.22
utopic

released

2.0.21-stable-1ubuntu1.14.10.1

Показывать по

EPSS

Процентиль: 77%
0.01085
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

nvd
почти 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

debian
почти 10 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x befor ...

github
около 3 лет назад

Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.

fstec
почти 10 лет назад

Уязвимости библиотеки Libevent, позволяющие нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 77%
0.01085
Низкий

7.5 High

CVSS2