exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3119-1

Debian Security Advisory 3119-1
Posted Jan 6, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3119-1 - Andrew Bartlett of Catalyst reported a defect affecting certain applications using the Libevent evbuffer API. This defect leaves applications which pass insanely large inputs to evbuffers open to a possible heap overflow or infinite loop. In order to exploit this flaw, an attacker needs to be able to find a way to provoke the program into trying to make a buffer chunk larger than what will fit into a single size_t or off_t.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2014-6272
SHA-256 | ba981464d57b711de3d7ce967eb091055c67eccec9d191c924fbdf642b319abe

Debian Security Advisory 3119-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3119-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 06, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libevent
CVE ID : CVE-2014-6272
Debian Bug : 774645

Andrew Bartlett of Catalyst reported a defect affecting certain
applications using the Libevent evbuffer API. This defect leaves
applications which pass insanely large inputs to evbuffers open to a
possible heap overflow or infinite loop. In order to exploit this flaw,
an attacker needs to be able to find a way to provoke the program into
trying to make a buffer chunk larger than what will fit into a single
size_t or off_t.

For the stable distribution (wheezy), this problem has been fixed in
version 2.0.19-stable-3+deb7u1.

For the upcoming stable distribution (jessie) and the unstable
distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your libevent packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=wi/U
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close