Описание
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 6:10.2-1 |
| esm-infra-legacy/trusty | released | 6:9.14-0ubuntu0.14.04.1 |
| lucid | DNE | |
| precise | released | 4:0.8.13-0ubuntu0.12.04.1 |
| trusty | released | 6:9.14-0ubuntu0.14.04.1 |
| trusty/esm | released | 6:9.14-0ubuntu0.14.04.1 |
| upstream | released | 6:10.2-1 |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
Integer overflow in the get_len function in libavutil/lzo.c in Libav b ...
Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3