CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H
AI Score
Confidence
High
EPSS
Percentile
26.1%
Integer overflow in libaom internal function img_alloc_helper can lead to
heap buffer overflow. This function can be reached via 3 callers: * Calling
aom_img_alloc() with a large value of the d_w, d_h, or align parameter may
result in integer overflows in the calculations of buffer sizes and offsets
and some fields of the returned aom_image_t struct may be invalid. *
Calling aom_img_wrap() with a large value of the d_w, d_h, or align
parameter may result in integer overflows in the calculations of buffer
sizes and offsets and some fields of the returned aom_image_t struct may be
invalid. * Calling aom_img_alloc_with_border() with a large value of the
d_w, d_h, align, size_align, or border parameter may result in integer
overflows in the calculations of buffer sizes and offsets and some fields
of the returned aom_image_t struct may be invalid.
Author | Note |
---|---|
mdeslaur | per the google bug, also appears to affect libvpx which is CVE-2024-5197 |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H
AI Score
Confidence
High
EPSS
Percentile
26.1%