// For flags

CVE-2024-5171

heap buffer overflow in libaom

Severity Score

10.0
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers:


* Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
* Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
* Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

El desbordamiento de enteros en la función interna de libaom img_alloc_helper puede provocar un desbordamiento del búfer del montón. Se puede acceder a esta función a través de 3 llamadores: * Llamar a aom_img_alloc() con un valor grande del parámetro d_w, d_h o align puede resultar en desbordamientos de enteros en los cálculos de tamaños y compensaciones del búfer y algunos campos de la estructura aom_image_t devuelta pueden ser inválido. * Llamar a aom_img_wrap() con un valor grande del parámetro d_w, d_h o align puede provocar desbordamientos de enteros en los cálculos de tamaños y compensaciones del búfer y algunos campos de la estructura aom_image_t devuelta pueden no ser válidos. * Llamar a aom_img_alloc_with_border() con un valor grande del parámetro d_w, d_h, align, size_align o border puede provocar desbordamientos de enteros en los cálculos de tamaños y compensaciones del búfer y algunos campos de la estructura aom_image_t devuelta pueden no ser válidos.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
High
Integrity
High
High
Availability
High
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-05-21 CVE Reserved
  • 2024-06-05 CVE Published
  • 2024-07-24 EPSS Updated
  • 2024-09-07 CVE Updated
  • 2024-09-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
  • CWE-190: Integer Overflow or Wraparound
CAPEC
  • CAPEC-100: Overflow Buffers
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Aomedia
Search vendor "Aomedia"
Libaom
Search vendor "Aomedia" for product "Libaom"
>= 1.0.0 <= 3.9.0
Search vendor "Aomedia" for product "Libaom" and version " >= 1.0.0 <= 3.9.0"
-
Affected