Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-0899

Опубликовано: 23 фев. 2013
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

Integer overflow in the padding implementation in the opus_packet_parse_impl function in src/opus_decoder.c in Opus before 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a long packet.

РелизСтатусПримечание
devel

released

25.0.1364.160-0ubuntu1
hardy

DNE

lucid

released

25.0.1364.160-0ubuntu0.10.04.1
oneiric

released

25.0.1364.160-0ubuntu0.11.10.1
precise

released

25.0.1364.160-0ubuntu0.12.04.1
quantal

released

25.0.1364.160-0ubuntu0.12.10.1
upstream

released

25.0.1364.97

Показывать по

EPSS

Процентиль: 78%
0.01165
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
почти 13 лет назад

Integer overflow in the padding implementation in the opus_packet_parse_impl function in src/opus_decoder.c in Opus before 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a long packet.

debian
почти 13 лет назад

Integer overflow in the padding implementation in the opus_packet_pars ...

github
больше 3 лет назад

Integer overflow in the padding implementation in the opus_packet_parse_impl function in src/opus_decoder.c in Opus before 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a long packet.

EPSS

Процентиль: 78%
0.01165
Низкий

5 Medium

CVSS2