7.5
CVSSv2

CVE-2020-36329

Published: 21/05/2021 Updated: 09/01/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A flaw was found in libwebp in versions prior to 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

webmproject libwebp

redhat enterprise linux 7.0

redhat enterprise linux 8.0

netapp ontap select deploy administration utility -

debian debian linux 9.0

debian debian linux 10.0

apple iphone os

apple ipados

Vendor Advisories

Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed For the stable distribution (buster), these problems have been fixed in version 061-2+deb10u1 We recommend t ...
A flaw was found in libwebp A heap-based buffer overflow was found in PutLE16() The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (CVE-2018-25011) A flaw was found in libwebp in versions before 101 An unitialized variable is used in function ReadSymbol The highest threat from t ...
A flaw was found in libwebp A heap-based buffer overflow was found in PutLE16() The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (CVE-2018-25011) A flaw was found in libwebp in versions before 101 A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2021-07-21-1 iOS 147 and iPadOS 147 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Apple Prod ...