← Retour aux CVEs
CVE-2015-2313
N/ADescription
Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an application invokes the totalSize method on an object reader, allows remote peers to cause a denial of service (CPU consumption) via a crafted small message, which triggers a "tight" for loop. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-2312.
Details CVE
Score CVSS v3.1N/A
Publie8/9/2017
Derniere modification4/20/2025
Sourcenvd
Observations honeypot0
Produits affectes
capnproto:capnproto
Faiblesses (CWE)
CWE-400
References
http://www.openwall.com/lists/oss-security/2015/03/17/3(security@debian.org)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568(security@debian.org)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-05-0-c%2B%2B-addl-cpu-amplification.md(security@debian.org)
https://github.com/capnproto/capnproto/commit/80149744bdafa3ad4eedc83f8ab675e27baee868(security@debian.org)
http://www.openwall.com/lists/oss-security/2015/03/17/3(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-05-0-c%2B%2B-addl-cpu-amplification.md(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/commit/80149744bdafa3ad4eedc83f8ab675e27baee868(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.