Product:

Libebml

(Matroska)
Repositories https://github.com/Matroska-Org/libebml
#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2024-01-12 CVE-2023-52339 In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows. Libebml 6.5
2021-02-23 CVE-2021-3405 A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. Debian_linux, Fedora, Libebml 6.5
2016-01-29 CVE-2015-8791 The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access. Libebml 4.3
2016-01-29 CVE-2015-8790 The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access. Libebml 4.3
2016-01-29 CVE-2015-8789 Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document. Libebml 9.6