Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-4485

Опубликовано: 16 авг. 2015
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libvpxfixed1.4.0-1package
libvpxnot-affectedjessiepackage
libvpxnot-affectedwheezypackage
libvpxnot-affectedsqueezepackage

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2015-89/

  • https://bugzilla.mozilla.org/show_bug.cgi?id=1178148 is restricted

EPSS

Процентиль: 92%
0.07878
Низкий

Связанные уязвимости

ubuntu
около 10 лет назад

Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.

redhat
около 10 лет назад

Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.

nvd
около 10 лет назад

Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.

github
больше 3 лет назад

Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.

fstec
около 10 лет назад

Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.07878
Низкий