Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3378

Опубликовано: 29 окт. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3

Описание

The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

hardy

not-affected

code not present
intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

1.9.1.9+nobinonly-0ubuntu1
hardy

DNE

intrepid

DNE

jaunty

released

1.9.1.9+nobinonly-0ubuntu0.9.04.1
karmic

released

1.9.1.9+nobinonly-0ubuntu0.9.10.1
upstream

released

1.9.1.4

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

1.9.2.6+nobinonly-0ubuntu0.8.04.1
intrepid

DNE

jaunty

ignored

end of life, was needs-triage
karmic

ignored

end of life, was needs-triage
upstream

not-affected

Показывать по

EPSS

Процентиль: 87%
0.03673
Низкий

9.3 Critical

CVSS2

Связанные уязвимости

nvd
около 16 лет назад

The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.

debian
около 16 лет назад

The oggplay_data_handle_theora_frame function in media/liboggplay/src/ ...

github
больше 3 лет назад

The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.

EPSS

Процентиль: 87%
0.03673
Низкий

9.3 Critical

CVSS2