CVE-2023-47471

Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*

History

21 Nov 2024, 08:30

Type Values Removed Values Added
References () https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7 - Patch, Vendor Advisory () https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7 - Patch, Vendor Advisory
References () https://github.com/strukturag/libde265/issues/426 - Issue Tracking, Vendor Advisory () https://github.com/strukturag/libde265/issues/426 - Issue Tracking, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html - () https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html -

30 Nov 2023, 19:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html -

29 Nov 2023, 20:27

Type Values Removed Values Added
References () https://github.com/strukturag/libde265/issues/426 - () https://github.com/strukturag/libde265/issues/426 - Issue Tracking, Vendor Advisory
References () https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7 - () https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7 - Patch, Vendor Advisory
CPE cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*
First Time Struktur
Struktur libde265
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

16 Nov 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-16 04:15

Updated : 2024-11-21 08:30


NVD link : CVE-2023-47471

Mitre link : CVE-2023-47471

CVE.ORG link : CVE-2023-47471


JSON object : View

Products Affected

struktur

  • libde265
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')