CVE-2015-6525

Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
VendorProductVersion
debiandebian_linux
7.1
libevent_projectlibevent
2.0.1
libevent_projectlibevent
2.0.2
libevent_projectlibevent
2.0.3
libevent_projectlibevent
2.0.4
libevent_projectlibevent
2.0.5
libevent_projectlibevent
2.0.6
libevent_projectlibevent
2.0.7
libevent_projectlibevent
2.0.8
libevent_projectlibevent
2.0.9
libevent_projectlibevent
2.0.10
libevent_projectlibevent
2.0.11
libevent_projectlibevent
2.0.12
libevent_projectlibevent
2.0.13
libevent_projectlibevent
2.0.14
libevent_projectlibevent
2.0.15
libevent_projectlibevent
2.0.16
libevent_projectlibevent
2.0.17
libevent_projectlibevent
2.0.18
libevent_projectlibevent
2.0.19
libevent_projectlibevent
2.0.20
libevent_projectlibevent
2.0.21
libevent_projectlibevent
2.1.1
libevent_projectlibevent
2.1.2
libevent_projectlibevent
2.1.3
libevent_projectlibevent
2.1.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libevent
bullseye
2.1.12-stable-1
fixed
squeeze
not-affected
bookworm
2.1.12-stable-8
fixed
sid
2.1.12-stable-10
fixed
trixie
2.1.12-stable-10
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libevent
vivid
not-affected
trusty
Fixed 2.0.21-stable-1ubuntu1.14.04.1
released
precise
Fixed 2.0.16-stable-1ubuntu0.1
released
Common Weakness Enumeration