mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
239 lines
8.7 KiB
JSON
239 lines
8.7 KiB
JSON
{
|
|
"id": "CVE-2017-13666",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-08-24T06:29:00.240",
|
|
"lastModified": "2024-11-21T03:11:23.123",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An integer underflow vulnerability exists in pixel-a.asm, the x86 assembly code for planeClipAndMax() in MulticoreWare x265 through 2.5, as used in libbpg and other products. A small height value can cause an integer underflow, which leads to a crash. This is a different vulnerability than CVE-2017-8906."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad de desbordamiento de n\u00fameros enteros en pixel-a.asm, el c\u00f3digo de ensamblado x86 para planeClipAndMax() en MulticoreWare x265 en su versi\u00f3n 2.5, tal y como se emplea en libbpg y otros productos. Un valor de altura peque\u00f1o puede provocar un desbordamiento de enteros, lo que llevar\u00eda a un bloqueo. Esta vulnerabilidad es diferente de CVE-2017-8906."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 2.1,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-191"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FAB78313-23B0-4C58-A87A-DEE57400CCE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86D38467-3E84-40F6-A7F9-03B90FE8A9BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "335C0E27-A30C-4A8B-9C58-9685C228A249"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44EEBD42-F04C-499D-9800-82962518525D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8CF2655-7781-4143-BEB8-F17439F08E31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B5559A2-94A4-492B-A587-2EEC553D0045"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76598BAE-B462-4042-A9B1-0A4753C5B98E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C33FBD6-54EB-44AA-93ED-B28530612609"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A9DD340-0C8D-411F-9219-9DA8598E7DF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7385B748-76F7-4167-810F-2442ABDCF79D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F123EF6-EDB7-4F5E-8830-5D744F6691A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59CEEB99-0CA8-4671-A8DF-22DED7198D8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92CE29FE-DEE3-472D-9F38-E60862E94C04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EA6F4AE-5169-4E67-859E-5ED1FF5164FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E48E4D6C-8753-4657-B710-EFFDFB284564"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C270A77-094F-445A-80D5-C36C9624478F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D71B1BD6-6DA8-4FDB-9BCF-BA9FC0799DE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "349FB1EB-DB9B-4C31-A472-5AB863D0AD44"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8CE68FE6-9115-47B8-A27B-447DF8D0A3A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD89DA5A-4BB7-4EAB-93B2-94D045DDC203"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F8304DB-D325-4C15-AF52-34D09046A8B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A58F171-2431-49CE-96E5-0606DE4B6465"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61FF812F-8D15-4074-AB26-BA0295D94E0F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F65BC15E-F21E-48B9-8E6B-032F8DF0223A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07B29D7F-FC1D-4703-9C0A-79D5566C6733"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:multicorewareinc:x265:2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B5A34C0-E24E-46DA-8CFD-0226F38463A4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://bitbucket.org/multicoreware/x265/issues/364/integer-overflow-and-affect-top-level",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://bitbucket.org/multicoreware/x265/issues/364/integer-overflow-and-affect-top-level",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |