ID CVE-2018-25011
Summary A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Vulnerable Configurations
  • cpe:2.3:a:webmproject:libwebp:-:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:-:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.1.99:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.1.99:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:webmproject:libwebp:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:webmproject:libwebp:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 23-07-2021 - 09:15)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
Last major update 23-07-2021 - 09:15
Published 21-05-2021 - 17:15
Last modified 23-07-2021 - 09:15
Back to Top