Описание
The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.3.3-1 |
| esm-apps/xenial | not-affected | 1.3.3-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.3.0-2+deb8u1build0.14.04.1]] |
| precise | released | 1.2.2-2+deb7u1build0.12.04.1 |
| trusty | released | 1.3.0-2+deb8u1build0.14.04.1 |
| trusty/esm | DNE | trusty was released [1.3.0-2+deb8u1build0.14.04.1] |
| upstream | released | 1.3.3 |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
Ссылки на источники
EPSS
4.3 Medium
CVSS2
4.3 Medium
CVSS3
Связанные уязвимости
The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 a ...
The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
EPSS
4.3 Medium
CVSS2
4.3 Medium
CVSS3