Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-4029

Опубликовано: 26 июл. 2007
Источник: debian
EPSS Низкий

Описание

libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libvorbisidecfixed1.0.2+svn16259-2package
libvorbisfixed1.2.0.dfsg-1package

Примечания

  • svn revisions fixing this https://bugzilla.redhat.com/show_bug.cgi?id=249780

EPSS

Процентиль: 79%
0.01389
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.

redhat
почти 18 лет назад

libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.

nvd
почти 18 лет назад

libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.

github
около 3 лет назад

libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.

oracle-oval
почти 18 лет назад

ELSA-2007-0845: Important:libvorbis security update (NA)

EPSS

Процентиль: 79%
0.01389
Низкий