Lucene search

K
mozillaMozilla FoundationMFSA2015-89
HistoryAug 11, 2015 - 12:00 a.m.

Buffer overflows on Libvpx when decoding WebM video — Mozilla

2015-08-1100:00:00
Mozilla Foundation
www.mozilla.org
23

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.3%

Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover two buffer overflow issues in the Libvpx library used for WebM video when decoding a malformed WebM video file. These buffer overflows result in potentially exploitable crashes.

Affected configurations

Vulners
Node
mozillafirefoxRange<40
OR
mozillafirefox_esrRange<38.2
OR
mozillafirefox_osRange<2.5
OR
mozillaseamonkeyRange<2.35

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.3%