Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-36328

Опубликовано: 21 мая 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5
CVSS3: 9.8

Описание

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

РелизСтатусПримечание
bionic

released

0.6.1-2ubuntu0.18.04.1
devel

released

0.6.1-2ubuntu1
esm-infra-legacy/trusty

not-affected

0.4.0-4ubuntu0.1~esm1
esm-infra/bionic

not-affected

0.6.1-2ubuntu0.18.04.1
esm-infra/focal

not-affected

0.6.1-2ubuntu0.20.04.1
esm-infra/xenial

released

0.4.4-1ubuntu0.1~esm1
focal

released

0.6.1-2ubuntu0.20.04.1
groovy

released

0.6.1-2ubuntu0.20.10.1
hirsute

released

0.6.1-2ubuntu0.21.04.1
impish

released

0.6.1-2ubuntu1

Показывать по

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
больше 5 лет назад

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 9.8
nvd
около 4 лет назад

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 9.8
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 9.8
debian
около 4 лет назад

A flaw was found in libwebp in versions before 1.0.1. A heap-based buf ...

CVSS3: 9.8
github
около 3 лет назад

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

7.5 High

CVSS2

9.8 Critical

CVSS3