← Zuruck zu CVEs
CVE-2015-2313
N/ABeschreibung
Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an application invokes the totalSize method on an object reader, allows remote peers to cause a denial of service (CPU consumption) via a crafted small message, which triggers a "tight" for loop. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-2312.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht8/9/2017
Zuletzt geandert4/20/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
capnproto:capnproto
Schwachen (CWE)
CWE-400
Referenzen
http://www.openwall.com/lists/oss-security/2015/03/17/3(security@debian.org)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568(security@debian.org)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-05-0-c%2B%2B-addl-cpu-amplification.md(security@debian.org)
https://github.com/capnproto/capnproto/commit/80149744bdafa3ad4eedc83f8ab675e27baee868(security@debian.org)
http://www.openwall.com/lists/oss-security/2015/03/17/3(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-05-0-c%2B%2B-addl-cpu-amplification.md(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/commit/80149744bdafa3ad4eedc83f8ab675e27baee868(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.