CVE-2020-36331
libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Se encontró un fallo en libwebp en versiones anteriores a 1.0.1. Se encontró una lectura fuera de límites en la función ChunkAssignData. La mayor amenaza de esta vulnerabilidad es la confidencialidad de los datos y la disponibilidad del servicio
A flaw was found in libwebp. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include an out of bounds read vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-04 CVE Reserved
- 2021-05-21 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2021/Jul/54 | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html | Mailing List |
|
https://security.netapp.com/advisory/ntap-20211112-0001 | Third Party Advisory |
|
https://support.apple.com/kb/HT212601 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1956856 | 2021-11-09 |
URL | Date | SRC |
---|---|---|
https://www.debian.org/security/2021/dsa-4930 | 2023-01-09 | |
https://access.redhat.com/security/cve/CVE-2020-36331 | 2021-11-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Webmproject Search vendor "Webmproject" | Libwebp Search vendor "Webmproject" for product "Libwebp" | < 1.0.1 Search vendor "Webmproject" for product "Libwebp" and version " < 1.0.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Ontap Select Deploy Administration Utility Search vendor "Netapp" for product "Ontap Select Deploy Administration Utility" | - | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Ipados Search vendor "Apple" for product "Ipados" | < 14.7 Search vendor "Apple" for product "Ipados" and version " < 14.7" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | < 14.7 Search vendor "Apple" for product "Iphone Os" and version " < 14.7" | - |
Affected
|