2024-12-08 03:06:42 +00:00

266 lines
9.4 KiB
JSON

{
"id": "CVE-2012-0947",
"sourceIdentifier": "security@ubuntu.com",
"published": "2012-08-20T18:55:02.950",
"lastModified": "2024-11-21T01:36:01.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media file in which the image size is not a multiple of the block size."
},
{
"lang": "es",
"value": "Un desbordamiento de b\u00fafer basado en memoria din\u00e1mica ('heap') en la funci\u00f3n vqa_decode_chunk en el c\u00f3dec VQA (vqavideo.c) en libavcodec en Libav v0.5.x antes de v0.5.9, v0.6.x antes de v0.6.6, v0.7.x antes de v0.7.6 y v0.8.x antes de v0.8.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo multimedia VQA modificado en el que el tama\u00f1o de la imagen no es m\u00faltiplo del tama\u00f1o del bloque.\r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F27FF9C0-652E-42E8-90D0-B9B369DD6C8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "15F27211-2DFC-4488-93D2-9A3664E593AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E6418D3A-9972-4819-B2E6-2510438698A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DF17452C-ED28-4558-9C90-102DF5485103"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CECEC54E-7014-447C-9174-8C2B026FF0B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "31BE32E4-9577-4BA7-A275-67A86DB7BCE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "16A3CC3F-C294-4DB3-97AE-1CFBED14A8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8E252038-F5E0-427F-8E59-FFD633497D09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD1BB7A-D6FF-4B80-9DA6-36D081FB41CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "530C27CC-3250-4C94-8D88-F423FFD0BD4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "936C1855-67FB-49C3-A20A-3FE331403366"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92EB185C-1909-4359-B0C1-681E4ABEEECF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "136C7881-DB5A-4018-B01F-D2F9069F53D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "090BF77B-A099-4ECD-A9BC-AAD4B499F4C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "18053821-801F-4652-AA73-9FDC5F562BA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
"matchCriteriaId": "B8B20C36-FD4A-4DEB-B060-90C25440606F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3FB24BD2-D741-4790-89C5-133BF8AEB191"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5322AE7-8CAD-45EF-9955-37D16EBBDD40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCDCA15-DF61-4150-96D7-10D68D07DAD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D50C72-65B2-4490-9259-2A436207A72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B3BCDD63-DECF-4494-BCA7-30BFEE7055D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F3260A66-B1C9-42F0-841E-63FAB009F020"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4953EC2E-BCD6-41B5-AEB3-0D82C15363A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3CEBE4E3-50F3-43CB-911F-E1B52C2B8B3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "86038BA1-9B14-4F12-9D61-B106E70F855C"
}
]
}
]
}
],
"references": [
{
"url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3",
"source": "security@ubuntu.com"
},
{
"url": "http://libav.org/",
"source": "security@ubuntu.com"
},
{
"url": "http://secunia.com/advisories/49089",
"source": "security@ubuntu.com"
},
{
"url": "http://www.debian.org/security/2012/dsa-2471",
"source": "security@ubuntu.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/05/03/4",
"source": "security@ubuntu.com"
},
{
"url": "http://www.securityfocus.com/bid/53389",
"source": "security@ubuntu.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-1479-1",
"source": "security@ubuntu.com"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963",
"source": "security@ubuntu.com",
"tags": [
"Exploit"
]
},
{
"url": "http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://libav.org/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/49089",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.debian.org/security/2012/dsa-2471",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/05/03/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/53389",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ubuntu.com/usn/USN-1479-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}