漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
漏洞信息
N/A
漏洞
N/A
漏洞
Libevent evbuffer API 基于堆的缓冲区溢出漏洞
漏洞信息
libevent是软件开发者Nick Mathewson和Niels Provos共同研发的一个异步事件处理软件函数库,它可通过应用程序编程接口(API)设定某些事件发生时所执行的函数。 Libevent的evbuffer API中存在整数溢出漏洞,该漏洞源于‘evbuffer_add’、‘evbuffer_expand’和‘bufferevent_write’函数没有充分过滤‘insanely large inputs’值。攻击者可利用该漏洞造成拒绝服务。以下版本受到影响:Libevent 1.4.15
漏洞信息
N/A
漏洞
N/A