GLSA-201502-07 : libevent: User-assisted execution of arbitrary code

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201502-07
(libevent: User-assisted execution of arbitrary code)

Multiple integer overflow errors in libevent could cause a heap-based
buffer overflow.

Impact :

A context-dependent attacker could cause an application linked against
libevent to pass an excessively long input through evbuffer, possibly
resulting in execution of arbitrary code with the privileges of the
process or a Denial of Service condition.

Workaround :

There is no known workaround at this time.

See also :

https://security.gentoo.org/glsa/201502-07

Solution :

All libevent users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-libs/libevent-2.0.22'

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 81230 ()

Bugtraq ID: 71971

CVE ID: CVE-2014-6272

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now