Описание
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.3.3-1 |
| esm-apps/xenial | not-affected | 1.3.3-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.3.0-2+deb8u1build0.14.04.1]] |
| precise | released | 1.2.2-2+deb7u1build0.12.04.1 |
| trusty | released | 1.3.0-2+deb8u1build0.14.04.1 |
| trusty/esm | DNE | trusty was released [1.3.0-2+deb8u1build0.14.04.1] |
| upstream | released | 1.3.3 |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
Ссылки на источники
9.3 Critical
CVSS2
9.6 Critical
CVSS3
Связанные уязвимости
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
Use-after-free vulnerability in the EbmlMaster::Read function in libEB ...
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
9.3 Critical
CVSS2
9.6 Critical
CVSS3