← Volver a CVEs
CVE-2015-2313
N/ADescripcion
Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an application invokes the totalSize method on an object reader, allows remote peers to cause a denial of service (CPU consumption) via a crafted small message, which triggers a "tight" for loop. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-2312.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado8/9/2017
Ultima modificacion4/20/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
capnproto:capnproto
Debilidades (CWE)
CWE-400
Referencias
http://www.openwall.com/lists/oss-security/2015/03/17/3(security@debian.org)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568(security@debian.org)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-05-0-c%2B%2B-addl-cpu-amplification.md(security@debian.org)
https://github.com/capnproto/capnproto/commit/80149744bdafa3ad4eedc83f8ab675e27baee868(security@debian.org)
http://www.openwall.com/lists/oss-security/2015/03/17/3(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-05-0-c%2B%2B-addl-cpu-amplification.md(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/commit/80149744bdafa3ad4eedc83f8ab675e27baee868(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.