Lucene search

K
cve[email protected]CVE-2024-5171
HistoryJun 05, 2024 - 8:15 p.m.

CVE-2024-5171

2024-06-0520:15:13
CWE-20
web.nvd.nist.gov
63
cve-2024-5171
integer overflow
libaom
buffer overflow
nvd

10 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Integer overflow in libaom internal functionΒ img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers:

  • Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
  • Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
  • Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

Affected configurations

Vulners
Node
libaomlibaomRange1.0.0–3.9.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "libaom",
    "repo": "https://aomedia.googlesource.com/aom/",
    "vendor": "libaom",
    "versions": [
      {
        "lessThan": "3.9.0",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "custom"
      }
    ]
  }
]

10 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%