9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.9 High
AI Score
Confidence
Low
0.008 Low
EPSS
Percentile
82.1%
Debian Security Advisory DSA-3538-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
March 31, 2016 https://www.debian.org/security/faq
Package : libebml
CVE ID : CVE-2015-8789 CVE-2015-8790 CVE-2015-8791
Several vulnerabilities were discovered in libebml, a library for
manipulating Extensible Binary Meta Language files.
CVE-2015-8789
Context-dependent attackers could trigger a use-after-free
vulnerability by providing a maliciously crafted EBML document.
CVE-2015-8790
Context-dependent attackers could obtain sensitive information
from the process' heap memory by using a maliciously crafted UTF-8
string.
CVE-2015-8791
Context-dependent attackers could obtain sensitive information
from the process' heap memory by using a maliciously crafted
length value in an EBML id.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.2-2+deb7u1.
For the stable distribution (jessie), these problems have been fixed in
version 1.3.0-2+deb8u1.
For the testing (stretch) and unstable (sid) distributions, these
problems have been fixed in version 1.3.3-1.
We recommend that you upgrade your libebml packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | powerpc | libebml-dev | < 1.2.2-2+deb7u1 | libebml-dev_1.2.2-2+deb7u1_powerpc.deb |
Debian | 8 | amd64 | libebml-dev | < 1.3.0-2+deb8u1 | libebml-dev_1.3.0-2+deb8u1_amd64.deb |
Debian | 8 | powerpc | libebml-dev | < 1.3.0-2+deb8u1 | libebml-dev_1.3.0-2+deb8u1_powerpc.deb |
Debian | 7 | i386 | libebml3 | < 1.2.2-2+deb7u1 | libebml3_1.2.2-2+deb7u1_i386.deb |
Debian | 8 | i386 | libebml4 | < 1.3.0-2+deb8u1 | libebml4_1.3.0-2+deb8u1_i386.deb |
Debian | 7 | mips | libebml3 | < 1.2.2-2+deb7u1 | libebml3_1.2.2-2+deb7u1_mips.deb |
Debian | 7 | s390 | libebml-dev | < 1.2.2-2+deb7u1 | libebml-dev_1.2.2-2+deb7u1_s390.deb |
Debian | 7 | kfreebsd-i386 | libebml-dev | < 1.2.2-2+deb7u1 | libebml-dev_1.2.2-2+deb7u1_kfreebsd-i386.deb |
Debian | 7 | mipsel | libebml-dev | < 1.2.2-2+deb7u1 | libebml-dev_1.2.2-2+deb7u1_mipsel.deb |
Debian | 7 | powerpc | libebml3 | < 1.2.2-2+deb7u1 | libebml3_1.2.2-2+deb7u1_powerpc.deb |
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.9 High
AI Score
Confidence
Low
0.008 Low
EPSS
Percentile
82.1%