CVE-2015-6525
Published Aug 24, 2015
Last updated 9 years ago
Overview
- Description
- Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B21E9A8-CE63-42C2-A11A-94D977A96DF1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0D7F7F3-5FA4-4812-B52E-A3A98BB395F4" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CDEE68F-FAE7-4F6A-BAE4-CB749459FC53" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F7716AC-3D51-4987-90B1-814ACA065932" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31792597-A8B3-4F22-9013-2103AA0170C0" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CDB0FC3-958E-4E9E-A366-8661BF84D588" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6598FFC5-6C18-487B-BEA5-9D291A5D4EA1" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "412E95EF-906D-4523-9820-6D145EDFA00D" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA715BA0-A989-407D-B5CA-B288D470D889" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F7C2E29-43FF-4539-B952-3FED67779579" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EF813B8-EEF9-425B-90B7-944E3FD3A03E" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F264AD63-C439-4DDE-A64A-F1CC3F9EE445" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A85D90CC-71BA-41D5-A283-221E9793CC35" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEF0A64A-A290-4670-A975-03A38808E2FA" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5E1FDA8-05D9-4368-8396-E9AED85B1919" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D210003F-B3DE-4964-8F1F-58AB1F75AFF0" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28B95E3A-356D-41BC-94DE-EF7018F0E430" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D5C29DA-FC46-40E1-84BA-3D4AA4E915E4" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "712FC1B9-F0C0-49BC-9E70-ADB2C18C442D" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0221BF5A-0E2C-4A3D-BF78-87A971BE1936" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCDCBAF3-A5F9-470B-9829-C26994BFBB29" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.0.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DEF0BCB-FAAC-4B92-BE12-A0741FFBE9AD" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86B978BE-1156-4C0A-A151-CC6E5ACE75BB" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A059287-BB94-4FC2-962B-EF1DBBF7D8FA" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78620372-0ACD-4863-B29E-8A5E6049A538" }, { "criteria": "cpe:2.3:a:libevent_project:libevent:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64A02886-DA11-4E95-B18E-563577B7BE0A" } ], "operator": "OR" } ] } ]