cvelist/2018/1000xxx/CVE-2018-1000050.json

64 lines
2.1 KiB
JSON
Raw Normal View History

2018-02-09 18:03:45 -05:00
{
2019-03-18 04:54:14 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "1/30/2018 14:23:10",
"ID": "CVE-2018-1000050",
"REQUESTER": "sean2@nothings.org",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-02-09 18:03:45 -05:00
{
2019-03-18 04:54:14 +00:00
"lang": "eng",
"value": "Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that can result in memory corruption, denial of service, comprised execution of host program. This attack appear to be exploitable via Victim must open a specially crafted Ogg Vorbis file. This vulnerability appears to have been fixed in 1.13."
2018-02-09 18:03:45 -05:00
}
2019-03-18 04:54:14 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/nothings/stb/commit/244d83bc3d859293f55812d48b3db168e581f6ab",
"refsource": "CONFIRM",
"url": "https://github.com/nothings/stb/commit/244d83bc3d859293f55812d48b3db168e581f6ab"
}
]
}
}