Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-37231

Опубликовано: 04 авг. 2021
Источник: debian
EPSS Низкий

Описание

A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
atomicparsleyfixed20210715.151551.e7ad03a-1package
atomicparsleyno-dsabullseyepackage
atomicparsleyno-dsabusterpackage
atomicparsleyno-dsastretchpackage
gtkpodremovedpackage
gtkpodignoredbookwormpackage
gtkpodignoredbullseyepackage
gtkpodignoredbusterpackage
gtkpodignoredstretchpackage

Примечания

  • https://github.com/wez/atomicparsley/issues/30

  • https://github.com/wez/atomicparsley/pull/31#issue-687280335

EPSS

Процентиль: 56%
0.00343
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.

CVSS3: 5.5
nvd
больше 4 лет назад

A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.

CVSS3: 5.5
github
больше 3 лет назад

A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.

EPSS

Процентиль: 56%
0.00343
Низкий