CVE-2015-6525 — Integer Overflow or Wraparound in Libevent
Severity
7.5HIGHNVD
EPSS
1.1%
top 22.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 24
Latest updateMay 17
Description
Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to d…
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages3 packages
Also affects: Debian Linux 7.0, 7.1
🔴Vulnerability Details
4📋Vendor Advisories
4💬Community
3Bugzilla
▶
Bugzilla▶
CVE-2014-6272 CVE-2015-6525 libevent: potential heap overflow in buffer/bufferevent APIs [fedora-all]↗2015-01-05