Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2015.0430
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2015-0430)
Zusammenfassung:The remote host is missing an update for the 'libebml, libmatroska' package(s) announced via the MGASA-2015-0430 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'libebml, libmatroska' package(s) announced via the MGASA-2015-0430 advisory.

Vulnerability Insight:
In EbmlMaster::Read() in libebml before 1.3.3, when the parser encountered
a deeply nested element with an infinite size then a following element of
an upper level was not propagated correctly. Instead the element with the
infinite size was added into the EBML element tree a second time resulting
in memory access after freeing it and multiple attempts to free the same
memory address during destruction (TALOS-CAN-0037).

In EbmlUnicodeString::UpdateFromUTF8() in libebml before 1.3.3, when
reading from a UTF-8 string in which the length indicated by a UTF-8
character's first byte exceeds the string's actual number of bytes the
parser would access beyond the end of the string resulting in a heap
information leak (TALOS-CAN-0036).

The libebml package has been updated to version 1.3.3, which fixes these
issues and other bugs, including another invalid memory access issue.

The libmatroska package has also been rebuilt against the updated libebml
and updated to version 1.4.4, which also fixes an invalid memory access
issue and other bugs. See the release announcements for details.

Affected Software/OS:
'libebml, libmatroska' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.