Matroska

Libebml

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.41%
  • Published 12.01.2024 02:15:44
  • Last modified 20.01.2025 16:15:26

In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.

Exploit
  • EPSS 1.48%
  • Published 23.02.2021 20:15:12
  • Last modified 21.11.2024 06:21:25

A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.

  • EPSS 0.34%
  • Published 29.01.2016 19:59:03
  • Last modified 12.04.2025 10:46:40

The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.

  • EPSS 0.54%
  • Published 29.01.2016 19:59:02
  • Last modified 12.04.2025 10:46:40

The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.

  • EPSS 0.38%
  • Published 29.01.2016 19:59:01
  • Last modified 12.04.2025 10:46:40

Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an E...