ID CVE-2014-6272
Summary Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
References
Vulnerable Configurations
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.13:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.13:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:1.4.14:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:1.4.14:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libevent_project:libevent:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:libevent_project:libevent:2.1.4:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 09-12-2017 - 02:29)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm https://puppet.com/security/cve/CVE-2014-6272
debian DSA-3119
mlist [Libevent-users] 20150105 Advisory: integer overflow in evbuffers for Libevent <= 1.4.14b,2.0.21,2.1.4-alpha [CVE-2014-6272]
slackware SSA:2016-085-01
Last major update 09-12-2017 - 02:29
Published 24-08-2015 - 14:59
Last modified 09-12-2017 - 02:29
Back to Top