Description
Integer underflow in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 might allow remote peers to cause a denial of service or possibly obtain sensitive information from memory or execute arbitrary code via a crafted message.
References (4)
Core 4
Core References
Mailing List, Third Party Advisory x_refsource_misc
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780566
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/03/17/3
Third Party Advisory x_refsource_confirm
https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-1-c%2B%2B-integer-underflow.md
Third Party Advisory x_refsource_confirm
https://github.com/capnproto/capnproto/commit/26bcceda72372211063d62aab7e45665faa83633
Scores
CVSS v3
9.8
EPSS
0.0098
EPSS Percentile
76.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-191
Status
published
Products (3)
capnproto/capnproto
0.5.0.0
capnproto/capnproto
0.5.1.0
capnproto/capnproto
< 0.4.1.0
Published
Aug 09, 2017
Tracked Since
Feb 18, 2026