Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-6525
HistoryAug 24, 2015 - 12:00 a.m.

CVE-2015-6525

2015-08-2400:00:00
ubuntu.com
ubuntu.com
6

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.8%

Multiple integer overflows in the evbuffer API in Libevent 2.0.x before
2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to
cause a denial of service or possibly have other unspecified impact via
“insanely large inputs” to the (1) evbuffer_add, (2) evbuffer_prepend, (3)
evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function,
which triggers a heap-based buffer overflow or an infinite loop. NOTE:
this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different
affected versions.

Bugs

Notes

Author Note
mdeslaur CVE was split from CVE-2014-6272, but fixes were already applied in usn-2477-1
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchlibevent< 2.0.16-stable-1ubuntu0.1UNKNOWN
ubuntu14.04noarchlibevent< 2.0.21-stable-1ubuntu1.14.04.1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.8%