Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vhcx-wrgv-8hv9

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof."

Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof."

EPSS

Процентиль: 80%
0.01444
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof."

nvd
больше 13 лет назад

Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof."

debian
больше 13 лет назад

Unspecified vulnerability in the read_var_block_data function in libav ...

EPSS

Процентиль: 80%
0.01444
Низкий