← Voltar para CVEs
CVE-2020-36328
CRITICAL9.8
Descricao
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado5/21/2021
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
apple:ipadosapple:iphone_osdebian:debian_linuxnetapp:ontap_select_deploy_administration_utilityredhat:enterprise_linuxwebmproject:libwebp
Fraquezas (CWE)
CWE-787CWE-787
Referencias
http://seclists.org/fulldisclosure/2021/Jul/54(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1956829(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20211112-0001/(secalert@redhat.com)
https://support.apple.com/kb/HT212601(secalert@redhat.com)
https://www.debian.org/security/2021/dsa-4930(secalert@redhat.com)
http://seclists.org/fulldisclosure/2021/Jul/54(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1956829(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20211112-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT212601(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4930(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.