Input validation error in Cap'n Proto - CVE-2015-2313
Published: August 9, 2017 / Updated: August 8, 2020
Vulnerability identifier: #VU38507
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-2313
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: capnproto
Affected software:
Cap'n Proto
Cap'n Proto
Detailed vulnerability description
The vulnerability allows remote peers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (CPU consumption) via a crafted small message, which triggers a "tight" for loop.
How to mitigate CVE-2015-2313
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Sources
- http://www.openwall.com/lists/oss-security/2015/03/17/3
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568
- https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-05-0-c%2B%2B-addl-cpu-amplification.md
- https://github.com/capnproto/capnproto/commit/80149744bdafa3ad4eedc83f8ab675e27baee868