[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2019-1359 --- libevent

ID: oval:org.secpod.oval:def:1700273Date: (C)2019-11-15   (M)2023-06-16
Class: PATCHFamily: unix




Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via quot;insanely large inputsquot; to the evbuffer_add, evbuffer_expand, or bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later. Multiple integer overflow flaws were found in the libevent#039;s evbuffer API. An attacker able to make an application pass an excessively long input to libevent using the API could use these flaws to make the application enter an infinite loop, crash, and, possibly, execute arbitrary code

Platform:
Amazon Linux 2
Product:
libevent
Reference:
ALAS2-2019-1359
CVE-2014-6272
CVE-2015-6525
CVE    2
CVE-2014-6272
CVE-2015-6525

© SecPod Technologies