Vulnerabilites related to matroska - libebml
cve-2015-8790
Vulnerability from cvelistv5
Published
2016-01-29 19:00
Modified
2024-08-06 08:29
Severity ?
EPSS score ?
Summary
The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2016/dsa-3538 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/95124 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html | vendor-advisory, x_refsource_SUSE | |
https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b | x_refsource_CONFIRM | |
http://www.talosintelligence.com/reports/TALOS-2016-0036/ | x_refsource_MISC | |
http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html | mailing-list, x_refsource_MLIST | |
https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/85307 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:29:22.019Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3538", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3538", }, { name: "95124", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95124", }, { name: "openSUSE-SU-2016:0125", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.talosintelligence.com/reports/TALOS-2016-0036/", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { name: "85307", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/85307", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-10-20T00:00:00", descriptions: [ { lang: "en", value: "The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-01-18T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-3538", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3538", }, { name: "95124", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95124", }, { name: "openSUSE-SU-2016:0125", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b", }, { tags: [ "x_refsource_MISC", ], url: "http://www.talosintelligence.com/reports/TALOS-2016-0036/", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { name: "85307", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/85307", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8790", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3538", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3538", }, { name: "95124", refsource: "BID", url: "http://www.securityfocus.com/bid/95124", }, { name: "openSUSE-SU-2016:0125", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { name: "https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b", refsource: "CONFIRM", url: "https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b", }, { name: "http://www.talosintelligence.com/reports/TALOS-2016-0036/", refsource: "MISC", url: "http://www.talosintelligence.com/reports/TALOS-2016-0036/", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", refsource: "MLIST", url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { name: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", refsource: "CONFIRM", url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { name: "85307", refsource: "BID", url: "http://www.securityfocus.com/bid/85307", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8790", datePublished: "2016-01-29T19:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-06T08:29:22.019Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-3405
Vulnerability from cvelistv5
Published
2021-02-23 19:05
Modified
2024-08-03 16:53
Severity ?
EPSS score ?
Summary
A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Matroska-Org/libebml/issues/74 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202208-21 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:53:17.531Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/issues/74", }, { name: "FEDORA-2021-9a0fff8455", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/", }, { name: "FEDORA-2021-aa78f97893", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/", }, { name: "FEDORA-2021-e283997bb9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/", }, { name: "[debian-lts-announce] 20210418 [SECURITY] [DLA 2629-1] libebml security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html", }, { name: "GLSA-202208-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-21", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "libebml", vendor: "n/a", versions: [ { status: "affected", version: "before 1.4.2", }, ], }, ], descriptions: [ { lang: "en", value: "A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "CWE-787", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-14T01:08:37", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/Matroska-Org/libebml/issues/74", }, { name: "FEDORA-2021-9a0fff8455", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/", }, { name: "FEDORA-2021-aa78f97893", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/", }, { name: "FEDORA-2021-e283997bb9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/", }, { name: "[debian-lts-announce] 20210418 [SECURITY] [DLA 2629-1] libebml security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html", }, { name: "GLSA-202208-21", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202208-21", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2021-3405", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "libebml", version: { version_data: [ { version_value: "before 1.4.2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/Matroska-Org/libebml/issues/74", refsource: "MISC", url: "https://github.com/Matroska-Org/libebml/issues/74", }, { name: "FEDORA-2021-9a0fff8455", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/", }, { name: "FEDORA-2021-aa78f97893", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/", }, { name: "FEDORA-2021-e283997bb9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/", }, { name: "[debian-lts-announce] 20210418 [SECURITY] [DLA 2629-1] libebml security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html", }, { name: "GLSA-202208-21", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-21", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2021-3405", datePublished: "2021-02-23T19:05:27", dateReserved: "2021-02-09T00:00:00", dateUpdated: "2024-08-03T16:53:17.531Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8789
Vulnerability from cvelistv5
Published
2016-01-29 19:00
Modified
2024-08-06 08:29
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2016/dsa-3538 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/94924 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html | vendor-advisory, x_refsource_SUSE | |
https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24 | x_refsource_CONFIRM | |
http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html | mailing-list, x_refsource_MLIST | |
https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog | x_refsource_CONFIRM | |
http://www.talosintelligence.com/reports/TALOS-2016-0037/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:29:22.017Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3538", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3538", }, { name: "94924", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/94924", }, { name: "openSUSE-SU-2016:0125", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.talosintelligence.com/reports/TALOS-2016-0037/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-10-20T00:00:00", descriptions: [ { lang: "en", value: "Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a \"deeply nested element with infinite size\" followed by another element of an upper level in an EBML document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-01-18T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-3538", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3538", }, { name: "94924", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/94924", }, { name: "openSUSE-SU-2016:0125", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { tags: [ "x_refsource_MISC", ], url: "http://www.talosintelligence.com/reports/TALOS-2016-0037/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8789", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a \"deeply nested element with infinite size\" followed by another element of an upper level in an EBML document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3538", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3538", }, { name: "94924", refsource: "BID", url: "http://www.securityfocus.com/bid/94924", }, { name: "openSUSE-SU-2016:0125", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { name: "https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24", refsource: "CONFIRM", url: "https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", refsource: "MLIST", url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { name: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", refsource: "CONFIRM", url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { name: "http://www.talosintelligence.com/reports/TALOS-2016-0037/", refsource: "MISC", url: "http://www.talosintelligence.com/reports/TALOS-2016-0037/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8789", datePublished: "2016-01-29T19:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-06T08:29:22.017Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8791
Vulnerability from cvelistv5
Published
2016-01-29 19:00
Modified
2024-08-06 08:29
Severity ?
EPSS score ?
Summary
The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2016/dsa-3538 | vendor-advisory, x_refsource_DEBIAN | |
https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html | vendor-advisory, x_refsource_SUSE | |
http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html | mailing-list, x_refsource_MLIST | |
https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:29:22.061Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3538", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3538", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90", }, { name: "openSUSE-SU-2016:0125", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-10-20T00:00:00", descriptions: [ { lang: "en", value: "The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-30T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-3538", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3538", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90", }, { name: "openSUSE-SU-2016:0125", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8791", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3538", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3538", }, { name: "https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90", refsource: "CONFIRM", url: "https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90", }, { name: "openSUSE-SU-2016:0125", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { name: "[matroska-users] 20151020 libEBML v1.3.3, libMatroska v1.4.4 released: important fixes", refsource: "MLIST", url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { name: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", refsource: "CONFIRM", url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8791", datePublished: "2016-01-29T19:00:00", dateReserved: "2016-01-29T00:00:00", dateUpdated: "2024-08-06T08:29:22.061Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-52339
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2025-01-20 16:03
Severity ?
EPSS score ?
Summary
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2025-01-20T16:03:15.440Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/issues/147", }, { tags: [ "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/pull/148", }, { tags: [ "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md", }, { tags: [ "x_transferred", ], url: "https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1.4.5", }, { name: "FEDORA-2024-ab879eeed1", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJUXVOIRWPP7OFYUKQZDNJTSLWCPIZBH/", }, { name: "FEDORA-2024-7261a9f668", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNANFT4P6KL4WDQ3TV6QQ44NSC7WKLAB/", }, { url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00016.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-02-05T03:06:21.730380", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://github.com/Matroska-Org/libebml/issues/147", }, { url: "https://github.com/Matroska-Org/libebml/pull/148", }, { url: "https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md", }, { url: "https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1.4.5", }, { name: "FEDORA-2024-ab879eeed1", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJUXVOIRWPP7OFYUKQZDNJTSLWCPIZBH/", }, { name: "FEDORA-2024-7261a9f668", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNANFT4P6KL4WDQ3TV6QQ44NSC7WKLAB/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-52339", datePublished: "2024-01-12T00:00:00", dateReserved: "2024-01-12T00:00:00", dateUpdated: "2025-01-20T16:03:15.440Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2021-02-23 20:15
Modified
2024-11-21 06:21
Severity ?
Summary
A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
matroska | libebml | * | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*", matchCriteriaId: "A929FB51-F804-41A9-AF60-834ECB4352E8", versionEndExcluding: "1.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.", }, { lang: "es", value: "Se encontró un fallo en libebml versiones anteriores a 1.4.2. Se presenta un error de desbordamiento de la pila en la implementación de las funciones EbmlString::ReadData y EbmlUnicodeString::ReadData en libebml", }, ], id: "CVE-2021-3405", lastModified: "2024-11-21T06:21:25.693", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-02-23T20:15:12.087", references: [ { source: "secalert@redhat.com", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/Matroska-Org/libebml/issues/74", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html", }, { source: "secalert@redhat.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/", }, { source: "secalert@redhat.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/", }, { source: "secalert@redhat.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-21", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/Matroska-Org/libebml/issues/74", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-21", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "secalert@redhat.com", type: "Primary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2016-01-29 19:59
Modified
2024-11-21 02:39
Severity ?
Summary
The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*", matchCriteriaId: "96E02511-A860-4F99-9DD2-37F63856A267", versionEndIncluding: "1.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.", }, { lang: "es", value: "La función EbmlElement::ReadCodedSizeValue en libEBML en versiones anteriores a 1.3.3 permite a atacantes dependientes del contexto obtener información sensible desde la memoria dinámica de proceso a través de un valor de longitud manipulado en un id EBML, lo que desencadena un acceso de memoria no válido.", }, ], id: "CVE-2015-8791", lastModified: "2024-11-21T02:39:12.327", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-01-29T19:59:03.217", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2016/dsa-3538", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { source: "cve@mitre.org", url: "https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2016/dsa-3538", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-01-12 02:15
Modified
2025-01-20 16:15
Severity ?
Summary
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*", matchCriteriaId: "E313D822-BEBC-43B6-BDA3-8221A80B66C6", versionEndExcluding: "1.4.5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.", }, { lang: "es", value: "En libebml anterior a 1.4.5, puede ocurrir un desbordamiento de enteros en MemIOCallback.cpp al leer o escribir. Puede provocar desbordamientos de búfer.", }, ], id: "CVE-2023-52339", lastModified: "2025-01-20T16:15:26.810", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-01-12T02:15:44.637", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1.4.5", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/issues/147", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "https://github.com/Matroska-Org/libebml/pull/148", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJUXVOIRWPP7OFYUKQZDNJTSLWCPIZBH/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNANFT4P6KL4WDQ3TV6QQ44NSC7WKLAB/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1.4.5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/issues/147", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/Matroska-Org/libebml/pull/148", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00016.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJUXVOIRWPP7OFYUKQZDNJTSLWCPIZBH/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNANFT4P6KL4WDQ3TV6QQ44NSC7WKLAB/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-01-29 19:59
Modified
2024-11-21 02:39
Severity ?
Summary
The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*", matchCriteriaId: "96E02511-A860-4F99-9DD2-37F63856A267", versionEndIncluding: "1.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.", }, { lang: "es", value: "La función EbmlUnicodeString::UpdateFromUTF8 en libEBML en versiones anteriores a 1.3.3 permite a atacantes dependientes del contexto obtener información sensible desde la memoria dinámica de proceso a través de una cadena UTF-8 manipulada, lo que desencadena un acceso de memoria no válido.", }, ], id: "CVE-2015-8790", lastModified: "2024-11-21T02:39:12.177", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-01-29T19:59:02.157", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2016/dsa-3538", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/85307", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/95124", }, { source: "cve@mitre.org", url: "http://www.talosintelligence.com/reports/TALOS-2016-0036/", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { source: "cve@mitre.org", url: "https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2016/dsa-3538", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/85307", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/95124", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.talosintelligence.com/reports/TALOS-2016-0036/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-01-29 19:59
Modified
2024-11-21 02:39
Severity ?
Summary
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*", matchCriteriaId: "96E02511-A860-4F99-9DD2-37F63856A267", versionEndIncluding: "1.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a \"deeply nested element with infinite size\" followed by another element of an upper level in an EBML document.", }, { lang: "es", value: "Vulnerabilidad de uso después de liberación de memoria en la función EbmlMaster::Read en libEBML en versiones anteriores a 1.3.3 permite a atacantes dependientes del contexto tener un impacto no especificado a través de un \"elemento anidado profundamente con tamaño infinito\" seguido por otro elemento de un nivel superior en un documento EBML.", }, ], evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", id: "CVE-2015-8789", lastModified: "2024-11-21T02:39:12.030", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-01-29T19:59:01.233", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2016/dsa-3538", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/94924", }, { source: "cve@mitre.org", url: "http://www.talosintelligence.com/reports/TALOS-2016-0037/", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { source: "cve@mitre.org", url: "https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2016/dsa-3538", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/94924", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.talosintelligence.com/reports/TALOS-2016-0037/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }