Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cp66-x46c-28rg

Опубликовано: 11 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 1.9
CVSS3: 3.3

Описание

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

EPSS

Процентиль: 3%
0.00014
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 3.3
ubuntu
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

CVSS3: 3.3
redhat
14 дней назад

A flaw was found in libheif. A local attacker could exploit an out-of-bounds read vulnerability in the `Track::load` function within the `stsz/stts` component. This manipulation could lead to a Denial of Service (DoS), making the affected system or application unavailable.

CVSS3: 3.3
nvd
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

CVSS3: 3.3
debian
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. Thi ...

EPSS

Процентиль: 3%
0.00014
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-119