Input validation error in Debian Linux and libevent - CVE-2015-6525

 

Input validation error in Debian Linux and libevent - CVE-2015-6525

Published: August 24, 2015 / Updated: August 9, 2020


Vulnerability identifier: #VU40670
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-6525
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Debian
libevent
Affected software:
Debian Linux
libevent

Detailed vulnerability description

The vulnerability allows context-dependent attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop.


How to mitigate CVE-2015-6525

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources