Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-5171

Опубликовано: 05 июн. 2024
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers:

  • Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
  • Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
  • Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:aomedia:libaom:*:*:*:*:*:*:*:*
Версия от 1.0.0 (включая) до 3.9.0 (включая)

EPSS

Процентиль: 64%
0.00485
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-190

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 1 года назад

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

CVSS3: 7.4
redhat
около 1 года назад

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

CVSS3: 9.8
debian
около 1 года назад

Integer overflow in libaom internal functionimg_alloc_helper can lead ...

suse-cvrf
около 1 года назад

Security update for libaom

suse-cvrf
около 1 года назад

Security update for libaom

EPSS

Процентиль: 64%
0.00485
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-190