[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3119-1 libevent -- libevent

ID: oval:org.secpod.oval:def:601900Date: (C)2015-01-08   (M)2023-06-16
Class: PATCHFamily: unix




Andrew Bartlett of Catalyst reported a defect affecting certain applications using the Libevent evbuffer API. This defect leaves applications which pass insanely large inputs to evbuffers open to a possible heap overflow or infinite loop. In order to exploit this flaw, an attacker needs to be able to find a way to provoke the program into trying to make a buffer chunk larger than what will fit into a single size_t or off_t.

Platform:
Debian 7.0
Product:
libevent-dev
Reference:
DSA-3119-1
CVE-2014-6272
CVE    1
CVE-2014-6272
CPE    2
cpe:/o:debian:debian_linux:7.x
cpe:/a:niels_provos:libevent

© SecPod Technologies