Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8792

Опубликовано: 29 янв. 2016
Источник: debian

Описание

The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libmatroskafixed1.4.4-1package

Примечания

  • http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html

  • https://github.com/Matroska-Org/libmatroska/commit/0a2d3e3644a7453b6513db2f9bc270f77943573f

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 10 лет назад

The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.

CVSS3: 5.3
nvd
около 10 лет назад

The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.

CVSS3: 5.3
github
больше 3 лет назад

The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.