GLSA-201502-07 : libevent: User-assisted execution of arbitrary code

High Nessus Plugin ID 81230


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201502-07 (libevent: User-assisted execution of arbitrary code)

Multiple integer overflow errors in libevent could cause a heap-based buffer overflow.
Impact :

A context-dependent attacker could cause an application linked against libevent to pass an excessively long input through evbuffer, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
Workaround :

There is no known workaround at this time.


All libevent users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-libs/libevent-2.0.22'

See Also

Plugin Details

Severity: High

ID: 81230

File Name: gentoo_GLSA-201502-07.nasl

Version: $Revision: 1.4 $

Type: local

Published: 2015/02/09

Modified: 2015/08/26

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:libevent, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/02/07

Reference Information

CVE: CVE-2014-6272

BID: 71971

GLSA: 201502-07