← Retour aux CVEs
CVE-2020-36328
CRITICAL9.8
Description
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie5/21/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
apple:ipadosapple:iphone_osdebian:debian_linuxnetapp:ontap_select_deploy_administration_utilityredhat:enterprise_linuxwebmproject:libwebp
Faiblesses (CWE)
CWE-787CWE-787
References
http://seclists.org/fulldisclosure/2021/Jul/54(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1956829(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20211112-0001/(secalert@redhat.com)
https://support.apple.com/kb/HT212601(secalert@redhat.com)
https://www.debian.org/security/2021/dsa-4930(secalert@redhat.com)
http://seclists.org/fulldisclosure/2021/Jul/54(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1956829(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20211112-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT212601(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4930(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.