7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.7 Medium
CVSS4
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
PASSIVE
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:L/SC:L/VI:H/SI:H/VA:N/SA:N/S:N/AU:N/R:A/V:D
6.6 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
35.5%
A heap overflow vulnerability exists in libvpx - Encoding a frame that has
larger dimensions than the originally configured size with VP9 may result
in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or
above
Author | Note |
---|---|
mdeslaur | same fix as CVE-2023-44488 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libvpx | < 1.7.0-3ubuntu0.18.04.1+esm1 | UNKNOWN |
ubuntu | 20.04 | noarch | libvpx | < 1.8.2-1ubuntu0.2 | UNKNOWN |
ubuntu | 22.04 | noarch | libvpx | < 1.11.0-2ubuntu2.2 | UNKNOWN |
ubuntu | 23.04 | noarch | libvpx | < 1.12.0-1ubuntu1.2 | UNKNOWN |
ubuntu | 23.10 | noarch | libvpx | < 1.12.0-1ubuntu2 | UNKNOWN |
ubuntu | 14.04 | noarch | libvpx | < any | UNKNOWN |
ubuntu | 16.04 | noarch | libvpx | < 1.5.0-2ubuntu1.1+esm2 | UNKNOWN |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.7 Medium
CVSS4
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
PASSIVE
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:L/SC:L/VI:H/SI:H/VA:N/SA:N/S:N/AU:N/R:A/V:D
6.6 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
35.5%