First published: Mon Mar 16 2015(Updated: )
Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.2, when an application invokes the totalSize method on an object reader, allows remote peers to cause a denial of service (CPU consumption) via a crafted small message, which triggers a "tight" for loop. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-2312.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Capnproto Capnproto | <=0.4.1.0 | |
Capnproto Capnproto | =0.5.0.0 | |
Capnproto Capnproto | =0.5.1.0 | |
Capnproto Capnproto | =0.5.1.1 | |
debian/capnproto | 0.7.0-7 0.9.2-2 1.0.1-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.