Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8791

Опубликовано: 29 янв. 2016
Источник: debian

Описание

The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libebmlfixed1.3.3-1package

Примечания

  • https://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html

  • https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 10 лет назад

The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.

CVSS3: 4.3
nvd
около 10 лет назад

The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.

CVSS3: 4.3
github
больше 3 лет назад

The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.