CVE-2015-2313Uncontrolled Resource Consumption in Capnproto

Severity
7.5HIGHNVD
EPSS
0.7%
top 28.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 9
Latest updateMay 17

Description

Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an application invokes the totalSize method on an object reader, allows remote peers to cause a denial of service (CPU consumption) via a crafted small message, which triggers a "tight" for loop. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-2312.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/capnproto< capnproto 0.4.1-3 (bookworm)
Debiancapnproto/capnproto< 0.4.1-3+3
NVDcapnproto/capnproto0.4.1.0+3

🔴Vulnerability Details

2
GHSA
GHSA-8f67-f75m-fxfm: Sandstorm Cap'n Proto before 02022-05-17
OSV
CVE-2015-2313: Sandstorm Cap'n Proto before 02017-08-09

📋Vendor Advisories

1
Debian
CVE-2015-2313: capnproto - Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an applicati...2015
CVE-2015-2313 — Uncontrolled Resource Consumption | cvebase