← Voltar para CVEs
CVE-2015-2312
N/ADescricao
Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service (CPU and possibly general resource consumption) via a list with a large number of elements.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado8/9/2017
Ultima modificacao4/20/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
capnproto:capnproto
Fraquezas (CWE)
CWE-400
Referencias
http://www.openwall.com/lists/oss-security/2015/03/17/3(security@debian.org)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780567(security@debian.org)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md(security@debian.org)
https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d(security@debian.org)
http://www.openwall.com/lists/oss-security/2015/03/17/3(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780567(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-2-all-cpu-amplification.md(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/capnproto/capnproto/commit/104870608fde3c698483fdef6b97f093fc15685d(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.