
CVE-2016-10195 – libevent: Stack-buffer overflow in the name_parse() function
https://notcve.org/view.php?id=CVE-2016-10195
13 Mar 2017 — The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read. La función name_parse en evdns.c en libevent en versiones anteriores a 2.1.6-beta permite a atacantes remotos tener un impacto no especificado a través de vectores que implican la variable label_len, lo que desencadena una lectura de pila fuera de los límites. A vulnerability was found in libevent with th... • http://www.debian.org/security/2017/dsa-3789 • CWE-125: Out-of-bounds Read •

CVE-2016-10196 – libevent: Stack-buffer overflow in evutil_parse_sockaddr_port()
https://notcve.org/view.php?id=CVE-2016-10196
13 Mar 2017 — Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument. Desbordamiento de búfer en la función evutil_parse_sockaddr_port en evutil.c en libevent en versiones anteriores a 2.1.6-beta permite a atacantes provocar una denegación de servicio (fallo de segmentación) a través de vectores que implican una cadena lar... • http://www.debian.org/security/2017/dsa-3789 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2016-10197 – libevent: Out-of-bounds read in search_make_new()
https://notcve.org/view.php?id=CVE-2016-10197
13 Mar 2017 — The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname. La función search_make_new en evdns.c en libevent en versiones anteriores a 2.1.6-beta permite a atacantes provocar una denegación de servicio (fuera de límites de lectura) a través de un nombre de host vacío. An out of bounds read vulnerability was found in libevent in the search_make_new function. If an attacker could cause an application using lib... • http://www.debian.org/security/2017/dsa-3789 • CWE-125: Out-of-bounds Read •

CVE-2015-6525
https://notcve.org/view.php?id=CVE-2015-6525
24 Aug 2015 — Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different aff... • http://archives.seul.org/libevent/users/Jan-2015/msg00010.html • CWE-189: Numeric Errors •

CVE-2014-6272 – Debian Security Advisory 3119-1
https://notcve.org/view.php?id=CVE-2014-6272
06 Jan 2015 — Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for ... • http://archives.seul.org/libevent/users/Jan-2015/msg00010.html • CWE-189: Numeric Errors •

CVE-2007-1030
https://notcve.org/view.php?id=CVE-2007-1030
21 Feb 2007 — Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset. Niels Provos libevent 1.2 y 1.2a permite a atacantes remotos provocar denegación de servicio (bucle infinito) a través de una respuesta DNS que contiene una puntero de etiqueta que referencia a su propio offset. • http://monkey.org/~provos/libevent •