In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
References
Configurations
History
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md - Release Notes | |
References | () https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1.4.5 - Release Notes | |
References | () https://github.com/Matroska-Org/libebml/issues/147 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://github.com/Matroska-Org/libebml/pull/148 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJUXVOIRWPP7OFYUKQZDNJTSLWCPIZBH/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNANFT4P6KL4WDQ3TV6QQ44NSC7WKLAB/ - |
05 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Jan 2024, 15:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Matroska-Org/libebml/pull/148 - Patch | |
References | () https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md - Release Notes | |
References | () https://github.com/Matroska-Org/libebml/issues/147 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1.4.5 - Release Notes | |
First Time |
Matroska
Matroska libebml |
|
CPE | cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:* | |
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
12 Jan 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-12 02:15
Updated : 2024-11-21 08:39
NVD link : CVE-2023-52339
Mitre link : CVE-2023-52339
CVE.ORG link : CVE-2023-52339
JSON object : View
Products Affected
matroska
- libebml
CWE
CWE-190
Integer Overflow or Wraparound