CVE-2008-1423

EUVD-2008-1427
Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
Affected Products (NVD)
VendorProductVersion
xiph.orglibvorbis
1.0.0
xiph.orglibvorbis
1.0.1
xiph.orglibvorbis
1.1.0
xiph.orglibvorbis
1.1.1
xiph.orglibvorbis
1.1.2
xiph.orglibvorbis
1.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libvorbis
bookworm
1.3.7-1
fixed
bullseye
1.3.7-1
fixed
sid
1.3.7-2
fixed
squeeze
no-dsa
trixie
1.3.7-2
fixed
libvorbisidec
bookworm
1.2.1+git20180316-7
fixed
bullseye
1.2.1+git20180316-7
fixed
sid
1.2.1+git20180316-8
fixed
squeeze
no-dsa
trixie
1.2.1+git20180316-8
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libvorbis
dapper
Fixed 1.1.2-0ubuntu2.3
released
feisty
ignored
gutsy
Fixed 1.2.0.dfsg-1ubuntu0.1
released
hardy
Fixed 1.2.0.dfsg-2ubuntu0.1
released
intrepid
not-affected
Common Weakness Enumeration
References