7.5
CVSSv2

CVE-2015-6525

Published: 24/08/2015 Updated: 26/08/2015
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in the evbuffer API in Libevent 2.0.x prior to 2.0.22 and 2.1.x prior to 2.1.5-beta allow context-dependent malicious users to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 7.1

libevent project libevent 2.0.1

libevent project libevent 2.0.10

libevent project libevent 2.0.11

libevent project libevent 2.0.12

libevent project libevent 2.0.5

libevent project libevent 2.0.6

libevent project libevent 2.0.7

libevent project libevent 2.0.8

libevent project libevent 2.0.17

libevent project libevent 2.0.18

libevent project libevent 2.0.19

libevent project libevent 2.0.2

libevent project libevent 2.0.13

libevent project libevent 2.0.15

libevent project libevent 2.0.21

libevent project libevent 2.0.4

libevent project libevent 2.0.9

libevent project libevent 2.1.2

libevent project libevent 2.1.4

libevent project libevent 2.0.14

libevent project libevent 2.0.16

libevent project libevent 2.0.20

libevent project libevent 2.0.3

libevent project libevent 2.1.1

libevent project libevent 2.1.3

Vendor Advisories

Multiple integer overflows in the evbuffer API in Libevent 14x before 1415, 20x before 2022, and 21x before 215-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which t ...
Multiple integer overflow flaws were found in the libevent's evbuffer API An attacker able to make an application pass an excessively long input to libevent using the API could use these flaws to make the application enter an infinite loop, crash, and, possibly, execute arbitrary code ...