Lucene search

K
cve[email protected]CVE-2024-5197
HistoryJun 03, 2024 - 2:15 p.m.

CVE-2024-5197

2024-06-0314:15:09
CWE-190
web.nvd.nist.gov
35
cve-2024-5197
nvd
vulnerability

5.9 Medium

CVSS4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/SC:L/VI:H/SI:L/VA:N/SA:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

Affected configurations

Vulners
Node
chromiumchromiumRange1.14.1

CNA Affected

[
  {
    "collectionURL": "https://chromium.googlesource.com/webm/",
    "defaultStatus": "unaffected",
    "packageName": "libvpx",
    "product": "libvpx",
    "programFiles": [
      "https://chromium.googlesource.com/webm/libvpx/+/refs/heads/main/vpx/src/vpx_image.c"
    ],
    "programRoutines": [
      {
        "name": "vpx_img_alloc()"
      },
      {
        "name": "vpx_img_wrap()"
      }
    ],
    "repo": "https://chromium.googlesource.com",
    "vendor": "Chromium",
    "versions": [
      {
        "lessThan": "1.14.1",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

5.9 Medium

CVSS4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/SC:L/VI:H/SI:L/VA:N/SA:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%