Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8789

Опубликовано: 29 янв. 2016
Источник: debian
EPSS Низкий

Описание

Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libebmlfixed1.3.3-1package
libebmlnot-affectedsqueezepackage

Примечания

  • http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html

  • https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24

EPSS

Процентиль: 59%
0.00379
Низкий

Связанные уязвимости

CVSS3: 9.6
ubuntu
около 10 лет назад

Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.

CVSS3: 9.6
nvd
около 10 лет назад

Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.

CVSS3: 9.6
github
больше 3 лет назад

Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.

EPSS

Процентиль: 59%
0.00379
Низкий