Lucene search

K
gentooGentoo FoundationGLSA-201502-07
HistoryFeb 07, 2015 - 12:00 a.m.

libevent: User-assisted execution of arbitrary code

2015-02-0700:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.1%

Background

libevent is a library to execute a function when a specific event occurs on a file descriptor.

Description

Multiple integer overflow errors in libevent could cause a heap-based buffer overflow.

Impact

A context-dependent attacker could cause an application linked against libevent to pass an excessively long input through evbuffer, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All libevent users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/libevent-2.0.22"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/libevent< 2.0.22UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.1%