{"id":"CVE-2015-2310","details":"Integer overflow in layout.c++ in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service or possibly obtain sensitive information from memory via a crafted message, related to pointer validation.","modified":"2026-04-10T03:46:13.838461Z","published":"2017-08-09T18:29:00Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/03/17/3"},{"type":"ADVISORY","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565"},{"type":"ADVISORY","url":"https://github.com/capnproto/capnproto/blob/master/security-advisories/2015-03-02-0-c%2B%2B-integer-overflow.md"},{"type":"ADVISORY","url":"https://github.com/capnproto/capnproto/commit/f343f0dbd0a2e87f17cd74f14186ed73e3fbdbfa"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/03/17/3"},{"type":"ARTICLE","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}