Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-8154

Опубликовано: 27 янв. 2015
Источник: debian
EPSS Низкий

Описание

The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vala-0.26fixed0.26.1-1.1package
vala-0.16not-affectedpackage
vala-0.14not-affectedpackage
valanot-affectedpackage

Примечания

  • https://bugzilla.gnome.org/show_bug.cgi?id=678663

  • https://git.gnome.org/browse/vala/commit/?id=3092537db65887e24a3d3e87a27caf9c5295e4f7

  • Binaries with buggy bindings package that use Gst.MapInfo() function

  • are affected as well and need to be rebuilt, shotwell, rygel, ...

EPSS

Процентиль: 75%
0.00888
Низкий

Связанные уязвимости

ubuntu
около 11 лет назад

The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overflow.

redhat
около 11 лет назад

The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overflow.

nvd
около 11 лет назад

The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overflow.

github
больше 3 лет назад

The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overflow.

EPSS

Процентиль: 75%
0.00888
Низкий