Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Libebml
(Matroska)Repositories | https://github.com/Matroska-Org/libebml |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-01-12 | CVE-2023-52339 | In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows. | Libebml | 6.5 | ||
2021-02-23 | CVE-2021-3405 | A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. | Debian_linux, Fedora, Libebml | 6.5 | ||
2016-01-29 | CVE-2015-8791 | The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access. | Libebml | 4.3 | ||
2016-01-29 | CVE-2015-8790 | The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access. | Libebml | 4.3 | ||
2016-01-29 | CVE-2015-8789 | Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document. | Libebml | 9.6 |