{ "id": "CVE-2017-13666", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-24T06:29:00.240", "lastModified": "2024-11-21T03:11:23.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer underflow vulnerability exists in pixel-a.asm, the x86 assembly code for planeClipAndMax() in MulticoreWare x265 through 2.5, as used in libbpg and other products. A small height value can cause an integer underflow, which leads to a crash. This is a different vulnerability than CVE-2017-8906." }, { "lang": "es", "value": "Existe una vulnerabilidad de desbordamiento de n\u00fameros enteros en pixel-a.asm, el c\u00f3digo de ensamblado x86 para planeClipAndMax() en MulticoreWare x265 en su versi\u00f3n 2.5, tal y como se emplea en libbpg y otros productos. Un valor de altura peque\u00f1o puede provocar un desbordamiento de enteros, lo que llevar\u00eda a un bloqueo. Esta vulnerabilidad es diferente de CVE-2017-8906." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-191" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FAB78313-23B0-4C58-A87A-DEE57400CCE6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "86D38467-3E84-40F6-A7F9-03B90FE8A9BC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "335C0E27-A30C-4A8B-9C58-9685C228A249" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "44EEBD42-F04C-499D-9800-82962518525D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8CF2655-7781-4143-BEB8-F17439F08E31" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9B5559A2-94A4-492B-A587-2EEC553D0045" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "76598BAE-B462-4042-A9B1-0A4753C5B98E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "2C33FBD6-54EB-44AA-93ED-B28530612609" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A9DD340-0C8D-411F-9219-9DA8598E7DF9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7385B748-76F7-4167-810F-2442ABDCF79D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1:*:*:*:*:*:*:*", "matchCriteriaId": "9F123EF6-EDB7-4F5E-8830-5D744F6691A8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "59CEEB99-0CA8-4671-A8DF-22DED7198D8B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "92CE29FE-DEE3-472D-9F38-E60862E94C04" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5EA6F4AE-5169-4E67-859E-5ED1FF5164FA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E48E4D6C-8753-4657-B710-EFFDFB284564" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6C270A77-094F-445A-80D5-C36C9624478F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "D71B1BD6-6DA8-4FDB-9BCF-BA9FC0799DE4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "349FB1EB-DB9B-4C31-A472-5AB863D0AD44" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "8CE68FE6-9115-47B8-A27B-447DF8D0A3A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "BD89DA5A-4BB7-4EAB-93B2-94D045DDC203" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F8304DB-D325-4C15-AF52-34D09046A8B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A58F171-2431-49CE-96E5-0606DE4B6465" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "61FF812F-8D15-4074-AB26-BA0295D94E0F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F65BC15E-F21E-48B9-8E6B-032F8DF0223A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "07B29D7F-FC1D-4703-9C0A-79D5566C6733" }, { "vulnerable": true, "criteria": "cpe:2.3:a:multicorewareinc:x265:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B5A34C0-E24E-46DA-8CFD-0226F38463A4" } ] } ] } ], "references": [ { "url": "https://bitbucket.org/multicoreware/x265/issues/364/integer-overflow-and-affect-top-level", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://bitbucket.org/multicoreware/x265/issues/364/integer-overflow-and-affect-top-level", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }