CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
43.6%
libvpx.so is vulnerable to Buffer Overflow. The vulnerability is due to the vp9_alloc_context_buffers
function in vp9_alloccommon.c
and the vp9_change_config
function in vp9_encoder.c
. There are no proper validation or handling for dynamic memory allocations when processing certain specially formatted video data via a crafted HTML page and fails to reallocate buffers correctly, allowing an attacker to crash or remotely execute arbitrary code.
www.openwall.com/lists/oss-security/2023/09/30/4
bugzilla.redhat.com/show_bug.cgi?id=2241806
github.com/webmproject/libvpx/commit/263682c9a29395055f3b3afe2d97be1828a6223f
github.com/webmproject/libvpx/commit/df9fd9d5b7325060b2b921558a1eb20ca7880937
github.com/webmproject/libvpx/compare/v1.13.0...v1.13.1
github.com/webmproject/libvpx/releases/tag/v1.13.1
lists.debian.org/debian-lts-announce/2023/10/msg00001.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/
lists.fedoraproject.org/archives/list/[email protected]/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/
security.gentoo.org/glsa/202310-04
www.debian.org/security/2023/dsa-5518