7.5
CVE-2015-6525
- EPSS 1.07%
- Published 24.08.2015 14:59:14
- Last modified 12.04.2025 10:46:40
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.
Data is provided by the National Vulnerability Database (NVD)
Debian ≫ Debian Linux Version7.1
Libevent Project ≫ Libevent Version2.0.1
Libevent Project ≫ Libevent Version2.0.2
Libevent Project ≫ Libevent Version2.0.3
Libevent Project ≫ Libevent Version2.0.4
Libevent Project ≫ Libevent Version2.0.5
Libevent Project ≫ Libevent Version2.0.6
Libevent Project ≫ Libevent Version2.0.7
Libevent Project ≫ Libevent Version2.0.8
Libevent Project ≫ Libevent Version2.0.9
Libevent Project ≫ Libevent Version2.0.10
Libevent Project ≫ Libevent Version2.0.11
Libevent Project ≫ Libevent Version2.0.12
Libevent Project ≫ Libevent Version2.0.13
Libevent Project ≫ Libevent Version2.0.14
Libevent Project ≫ Libevent Version2.0.15
Libevent Project ≫ Libevent Version2.0.16
Libevent Project ≫ Libevent Version2.0.17
Libevent Project ≫ Libevent Version2.0.18
Libevent Project ≫ Libevent Version2.0.19
Libevent Project ≫ Libevent Version2.0.20
Libevent Project ≫ Libevent Version2.0.21
Libevent Project ≫ Libevent Version2.1.1
Libevent Project ≫ Libevent Version2.1.2
Libevent Project ≫ Libevent Version2.1.3
Libevent Project ≫ Libevent Version2.1.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.07% | 0.768 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|