6.8
CVSSv2

CVE-2018-10392

Published: 26/04/2018 Updated: 30/11/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote malicious users to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xiph.org libvorbis 1.3.6

debian debian linux 8.0

debian debian linux 9.0

redhat enterprise linux 8.0

redhat enterprise linux eus 8.1

redhat enterprise linux eus 8.2

redhat enterprise linux eus 8.4

redhat enterprise linux server aus 8.2

redhat enterprise linux server aus 8.4

redhat enterprise linux server tus 8.2

redhat enterprise linux server tus 8.4

Vendor Advisories

Synopsis Low: libvorbis security update Type/Severity Security Advisory: Low Topic An update for libvorbis is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives a ...
Debian Bug report logs - #876780 libvorbis: CVE-2017-14160 (+ CVE-2018-10392 CVE-2018-10393) Package: src:libvorbis; Maintainer for src:libvorbis is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 25 Sep 2017 20:15:01 UTC Severity: i ...
Several security issues were fixed in Vorbis ...
A heap-based buffer overflow was found in the encoder functionality of the libvorbis library An attacker could create a malicious file to cause a denial of service, crashing the application containing the library ...