Lucene search

K
nvd[email protected]NVD:CVE-2015-6525
HistoryAug 24, 2015 - 2:59 p.m.

CVE-2015-6525

2015-08-2414:59:14
CWE-189
web.nvd.nist.gov
7

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

9.8

Confidence

High

EPSS

0.005

Percentile

75.3%

Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via “insanely large inputs” to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.

Affected configurations

Nvd
Node
debiandebian_linuxMatch7.1
Node
libevent_projectlibeventMatch2.0.1
OR
libevent_projectlibeventMatch2.0.2
OR
libevent_projectlibeventMatch2.0.3
OR
libevent_projectlibeventMatch2.0.4
OR
libevent_projectlibeventMatch2.0.5
OR
libevent_projectlibeventMatch2.0.6
OR
libevent_projectlibeventMatch2.0.7
OR
libevent_projectlibeventMatch2.0.8
OR
libevent_projectlibeventMatch2.0.9
OR
libevent_projectlibeventMatch2.0.10
OR
libevent_projectlibeventMatch2.0.11
OR
libevent_projectlibeventMatch2.0.12
OR
libevent_projectlibeventMatch2.0.13
OR
libevent_projectlibeventMatch2.0.14
OR
libevent_projectlibeventMatch2.0.15
OR
libevent_projectlibeventMatch2.0.16
OR
libevent_projectlibeventMatch2.0.17
OR
libevent_projectlibeventMatch2.0.18
OR
libevent_projectlibeventMatch2.0.19
OR
libevent_projectlibeventMatch2.0.20
OR
libevent_projectlibeventMatch2.0.21
OR
libevent_projectlibeventMatch2.1.1
OR
libevent_projectlibeventMatch2.1.2
OR
libevent_projectlibeventMatch2.1.3
OR
libevent_projectlibeventMatch2.1.4
VendorProductVersionCPE
debiandebian_linux7.1cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
libevent_projectlibevent2.0.1cpe:2.3:a:libevent_project:libevent:2.0.1:*:*:*:*:*:*:*
libevent_projectlibevent2.0.2cpe:2.3:a:libevent_project:libevent:2.0.2:*:*:*:*:*:*:*
libevent_projectlibevent2.0.3cpe:2.3:a:libevent_project:libevent:2.0.3:*:*:*:*:*:*:*
libevent_projectlibevent2.0.4cpe:2.3:a:libevent_project:libevent:2.0.4:*:*:*:*:*:*:*
libevent_projectlibevent2.0.5cpe:2.3:a:libevent_project:libevent:2.0.5:*:*:*:*:*:*:*
libevent_projectlibevent2.0.6cpe:2.3:a:libevent_project:libevent:2.0.6:*:*:*:*:*:*:*
libevent_projectlibevent2.0.7cpe:2.3:a:libevent_project:libevent:2.0.7:*:*:*:*:*:*:*
libevent_projectlibevent2.0.8cpe:2.3:a:libevent_project:libevent:2.0.8:*:*:*:*:*:*:*
libevent_projectlibevent2.0.9cpe:2.3:a:libevent_project:libevent:2.0.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 261

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

9.8

Confidence

High

EPSS

0.005

Percentile

75.3%