GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Feb 07, 2015 11:26 pm Post subject: [ GLSA 201502-07 ] libevent |
|
|
Gentoo Linux Security Advisory
Title: libevent: User-assisted execution of arbitrary code (GLSA 201502-07)
Severity: normal
Exploitable: local, remote
Date: February 07, 2015
Bug(s): #535774
ID: 201502-07
Synopsis
Multiple integer overflow errors in libevent could result in
execution of arbitrary code or Denial of Service.
Background
libevent is a library to execute a function when a specific event occurs
on a file descriptor.
Affected Packages
Package: dev-libs/libevent
Vulnerable: < 2.0.22
Unaffected: >= 2.0.22
Architectures: All supported architectures
Description
Multiple integer overflow errors in libevent could cause a heap-based
buffer overflow.
Impact
A context-dependent attacker could cause an application linked against
libevent to pass an excessively long input through evbuffer, possibly
resulting in execution of arbitrary code with the privileges of the
process or a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All libevent users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libevent-2.0.22"
|
References
CVE-2014-6272
Last edited by GLSA on Thu Jun 18, 2015 4:16 am; edited 1 time in total |
|