5 results (0.008 seconds)

CVSS: 9.8EPSS: 7%CPEs: 2EXPL: 1

13 Mar 2017 — The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read. La función name_parse en evdns.c en libevent en versiones anteriores a 2.1.6-beta permite a atacantes remotos tener un impacto no especificado a través de vectores que implican la variable label_len, lo que desencadena una lectura de pila fuera de los límites. A vulnerability was found in libevent with th... • http://www.debian.org/security/2017/dsa-3789 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 1

13 Mar 2017 — Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument. Desbordamiento de búfer en la función evutil_parse_sockaddr_port en evutil.c en libevent en versiones anteriores a 2.1.6-beta permite a atacantes provocar una denegación de servicio (fallo de segmentación) a través de vectores que implican una cadena lar... • http://www.debian.org/security/2017/dsa-3789 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 1

13 Mar 2017 — The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname. La función search_make_new en evdns.c en libevent en versiones anteriores a 2.1.6-beta permite a atacantes provocar una denegación de servicio (fuera de límites de lectura) a través de un nombre de host vacío. An out of bounds read vulnerability was found in libevent in the search_make_new function. If an attacker could cause an application using lib... • http://www.debian.org/security/2017/dsa-3789 • CWE-125: Out-of-bounds Read •

CVSS: 10.0EPSS: 1%CPEs: 26EXPL: 0

24 Aug 2015 — Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different aff... • http://archives.seul.org/libevent/users/Jan-2015/msg00010.html • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 1%CPEs: 41EXPL: 0

06 Jan 2015 — Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for ... • http://archives.seul.org/libevent/users/Jan-2015/msg00010.html • CWE-189: Numeric Errors •