6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
libvpx.so is vulnerable to information disclosure. The vulnerability exists as malicious user-input is not validated, resulting in a use-after-free in postproc.c
and allowing retrieval of confidential information upon a successful exploitation.
CPE | Name | Operator | Version |
---|---|---|---|
libvpx.so | le | 5.0.0 | |
libvpx | eq | 1.7.0__6.el8 | |
libvpx.so | le | 5.0.0 | |
libvpx | eq | 1.7.0__6.el8 |
lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html
www.openwall.com/lists/oss-security/2019/10/25/17
www.openwall.com/lists/oss-security/2019/10/27/1
www.openwall.com/lists/oss-security/2019/11/07/1
github.com/webmproject/libvpx/commit/52add5896661d186dec284ed646a4b33b607d2c7
lists.debian.org/debian-lts-announce/2019/11/msg00030.html
lists.fedoraproject.org/archives/list/[email protected]/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/
lists.fedoraproject.org/archives/list/[email protected]/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/
seclists.org/bugtraq/2019/Nov/43
security.gentoo.org/glsa/202003-59
source.android.com/security/bulletin/android-10
usn.ubuntu.com/4199-1/
usn.ubuntu.com/4199-2/
www.debian.org/security/2019/dsa-4578
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N