Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-4609

Опубликовано: 14 янв. 2020
Источник: debian
EPSS Низкий

Описание

Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libavfixed6:10.2-1package

Примечания

  • http://git.libav.org/?p=libav.git;a=commit;h=ccda51b14c0fcae2fad73a24872dce75a7964996

EPSS

Процентиль: 84%
0.02154
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.

CVSS3: 8.8
nvd
около 6 лет назад

Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.

CVSS3: 8.8
github
больше 3 лет назад

Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.

EPSS

Процентиль: 84%
0.02154
Низкий