CVE-2018-1000050
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that can result in memory corruption, denial of service, comprised execution of host program. This attack appear to be exploitable via Victim must open a specially crafted Ogg Vorbis file. This vulnerability appears to have been fixed in 1.13.
Sean Barrett stb_vorbis, en versiones 1.12 y anteriores, contiene una vulnerabilidad de desbordamiento de búfer en todas las rutas de decodificación vorbis. Esto puede resultar en la corrupción de memoria, denegación de servicio (DoS) o la ejecución comprimida del programa host. Este ataque parece ser explotable mediante una víctima que abra un archivo Ogg Vorbis especialmente manipulado. Parece ser que la vulnerabilidad se ha solucionado en v1.13.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-02-05 CVE Reserved
- 2018-02-09 CVE Published
- 2024-08-05 CVE Updated
- 2024-10-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/nothings/stb/commit/244d83bc3d859293f55812d48b3db168e581f6ab | 2018-03-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Stb Vorbis Project Search vendor "Stb Vorbis Project" | Stb Vorbis Search vendor "Stb Vorbis Project" for product "Stb Vorbis" | <= 1.12 Search vendor "Stb Vorbis Project" for product "Stb Vorbis" and version " <= 1.12" | - |
Affected
|