7.5
CVSSv2

CVE-2015-2311

Published: 09/08/2017 Updated: 17/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer underflow in Sandstorm Cap'n Proto prior to 0.4.1.1 and 0.5.x prior to 0.5.1.1 might allow remote peers to cause a denial of service or possibly obtain sensitive information from memory or execute arbitrary code via a crafted message.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

capnproto capnproto 0.5.0.0

capnproto capnproto 0.5.1.0

capnproto capnproto

Vendor Advisories

Debian Bug report logs - #780565 capnproto: CVE-2015-2310: Integer overflow in pointer validation Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:36:01 UTC Severit ...
Debian Bug report logs - #780568 capnproto: CVE-2015-2313: CPU usage amplification attack #2 Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:48:06 UTC Severity: gr ...
Debian Bug report logs - #780567 capnproto: CVE-2015-2312: CPU usage amplification attack Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:48:01 UTC Severity: grave ...
Debian Bug report logs - #780566 capnproto: CVE-2015-2311: Integer underflow in pointer validation Package: capnproto; Maintainer for capnproto is Tom Lee <debian@tomleeco>; Source for capnproto is src:capnproto (PTS, buildd, popcon) Reported by: Tom Lee <debian@tomleeco> Date: Mon, 16 Mar 2015 04:45:02 UTC Severi ...