The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.
References
Configurations
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html - Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html - | |
References | () http://www.debian.org/security/2016/dsa-3538 - | |
References | () http://www.securityfocus.com/bid/85307 - | |
References | () http://www.securityfocus.com/bid/95124 - | |
References | () http://www.talosintelligence.com/reports/TALOS-2016-0036/ - | |
References | () https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog - Vendor Advisory | |
References | () https://github.com/Matroska-Org/libebml/commit/ababb64e0c792ad2a314245233db0833ba12036b - |
Information
Published : 2016-01-29 19:59
Updated : 2024-11-21 02:39
NVD link : CVE-2015-8790
Mitre link : CVE-2015-8790
CVE.ORG link : CVE-2015-8790
JSON object : View
Products Affected
matroska
- libebml
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor