Описание
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | released  | 1.1.2-0ubuntu2.2 | 
| devel | not-affected  | |
| edgy | released  | 1.1.2-1ubuntu1.2 | 
| feisty | released  | 1.1.2.dfsg-1.2ubuntu2 | 
| upstream | released  | 1.2.0 | 
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows cont ...
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
EPSS
6.8 Medium
CVSS2