Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6272

EPSS 1.08% · P78
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-6272

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Libevent evbuffer API 基于堆的缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
libevent是软件开发者Nick Mathewson和Niels Provos共同研发的一个异步事件处理软件函数库,它可通过应用程序编程接口(API)设定某些事件发生时所执行的函数。 Libevent的evbuffer API中存在整数溢出漏洞,该漏洞源于‘evbuffer_add’、‘evbuffer_expand’和‘bufferevent_write’函数没有充分过滤‘insanely large inputs’值。攻击者可利用该漏洞造成拒绝服务。以下版本受到影响:Libevent 1.4.15
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-6272

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-6272

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-08-24 · 45 CVEs total

CVE-2015-6658Drupal Autocomplete System 跨站脚本漏洞
CVE-2015-6661Drupal 信息泄露漏洞
CVE-2015-6660Drupal Form API模块跨站请求伪造漏洞
CVE-2015-6662SAP NetWeaver Portal XML外部实体漏洞
CVE-2015-6665Drupal Ajax处理程序和Ctools模块跨站脚本漏洞
CVE-2015-5566多款Adobe产品释放后重用漏洞
CVE-2015-6563OpenSSH sshd monitor组件输入验证错误漏洞
CVE-2015-6564OpenSSH sshd monitor.c文件权限许可和访问控制问题漏洞
CVE-2015-6565OpenSSH sshd 权限许可和访问控制问题漏洞
CVE-2015-6664SAP Mobile Platform application import XML外部实体漏洞
CVE-2015-6659Drupal Database API模块SQL注入漏洞
CVE-2015-6525Libevent evbuffer API 数字错误漏洞
CVE-2015-6524Apache ActiveMQ Java Authentication and Authorization Service 信任管理漏洞
CVE-2015-6496conntrack-tools conntrackd 拒绝服务漏洞
CVE-2015-6251GnuTLS‘common.c’双重释放漏洞
CVE-2015-5964Django 资源管理错误漏洞
CVE-2015-5963Django 资源管理错误漏洞
CVE-2015-5222Red Hat OpenShift Enterprise 权限许可和访问控制问题漏洞
CVE-2015-5058多款F5产品资源管理错误漏洞
CVE-2015-0298mod_cluster 跨站脚本漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-6272

No comments yet


Leave a comment