libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.
References
Link | Resource |
---|---|
https://github.com/strukturag/libde265/issues/236 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2023/dsa-5346 | Third Party Advisory |
Information
Published : 2021-09-16 15:15
Updated : 2023-02-22 10:02
NVD link : CVE-2020-21596
Mitre link : CVE-2020-21596
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
struktur
- libde265
debian
- debian_linux