9.1
CVSSv3

CVE-2015-2310

Published: 09/08/2017 Updated: 11/12/2019
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

Integer overflow in layout.c++ in Sandstorm Cap'n Proto prior to 0.4.1.1 and 0.5.x prior to 0.5.1.1 allows remote peers to cause a denial of service or possibly obtain sensitive information from memory via a crafted message, related to pointer validation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

capnproto capnproto

Vendor Advisories

Debian Bug report logs - #780565 capnproto: CVE-2015-2310: Integer overflow in pointer validation Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:36:01 UTC Severit ...
Debian Bug report logs - #780568 capnproto: CVE-2015-2313: CPU usage amplification attack #2 Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:48:06 UTC Severity: gr ...
Debian Bug report logs - #780567 capnproto: CVE-2015-2312: CPU usage amplification attack Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:48:01 UTC Severity: grave ...
Debian Bug report logs - #780566 capnproto: CVE-2015-2311: Integer underflow in pointer validation Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:45:02 UTC Severi ...