[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Heap-based buffer overflow vulnerability in libevent via an excessively long input

ID: oval:org.secpod.oval:def:24736Date: (C)2015-06-08   (M)2021-06-02
Class: VULNERABILITYFamily: unix




The host is installed with libevent in RHEL 6 or 7 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an excessively long input. Successful exploitation could allow attackers to crash the service.

Platform:
Red Hat Enterprise Linux 6
Product:
libevent
Reference:
CVE-2014-6272
CVE    1
CVE-2014-6272
CPE    3
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:niels_provos:libevent

© SecPod Technologies