Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2015.0430
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2015-0430)
Resumen:The remote host is missing an update for the 'libebml, libmatroska' package(s) announced via the MGASA-2015-0430 advisory.
Descripción:Summary:
The remote host is missing an update for the 'libebml, libmatroska' package(s) announced via the MGASA-2015-0430 advisory.

Vulnerability Insight:
In EbmlMaster::Read() in libebml before 1.3.3, when the parser encountered
a deeply nested element with an infinite size then a following element of
an upper level was not propagated correctly. Instead the element with the
infinite size was added into the EBML element tree a second time resulting
in memory access after freeing it and multiple attempts to free the same
memory address during destruction (TALOS-CAN-0037).

In EbmlUnicodeString::UpdateFromUTF8() in libebml before 1.3.3, when
reading from a UTF-8 string in which the length indicated by a UTF-8
character's first byte exceeds the string's actual number of bytes the
parser would access beyond the end of the string resulting in a heap
information leak (TALOS-CAN-0036).

The libebml package has been updated to version 1.3.3, which fixes these
issues and other bugs, including another invalid memory access issue.

The libmatroska package has also been rebuilt against the updated libebml
and updated to version 1.4.4, which also fixes an invalid memory access
issue and other bugs. See the release announcements for details.

Affected Software/OS:
'libebml, libmatroska' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.