Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-47212

Опубликовано: 01 мая 2024
Источник: debian

Описание

A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstbunfixedpackage
libstbpostponedtrixiepackage
libstbpostponedbookwormpackage
libstbno-dsabullseyepackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1846

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 9.8
nvd
почти 2 года назад

A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 9.8
github
почти 2 года назад

A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 9.8
fstec
около 2 лет назад

Уязвимость файла stb_vorbis.c библиотеки для C/C++ Libstb, позволяющая нарушителю выполнить произвольный код