Vulnerability Description
Integer overflow in layout.c++ in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service or possibly obtain sensitive information from memory via a crafted message, related to pointer validation.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Capnproto | Capnproto | < 0.4.1.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2015/03/17/3Mailing ListThird Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565Mailing ListThird Party Advisory
- https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-0Third Party Advisory
- https://github.com/capnproto/capnproto/commit/f343f0dbd0a2e87f17cd74f14186ed73e3Third Party Advisory
- http://www.openwall.com/lists/oss-security/2015/03/17/3Mailing ListThird Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565Mailing ListThird Party Advisory
- https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-0Third Party Advisory
- https://github.com/capnproto/capnproto/commit/f343f0dbd0a2e87f17cd74f14186ed73e3Third Party Advisory
FAQ
What is CVE-2015-2310?
CVE-2015-2310 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Integer overflow in layout.c++ in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service or possibly obtain sensitive information from memory vi...
How severe is CVE-2015-2310?
CVE-2015-2310 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2015-2310?
Check the references section above for vendor advisories and patch information. Affected products include: Capnproto Capnproto.