CVE-2008-1423

Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
xiph.orglibvorbis
1.0.0
xiph.orglibvorbis
1.0.1
xiph.orglibvorbis
1.1.0
xiph.orglibvorbis
1.1.1
xiph.orglibvorbis
1.1.2
xiph.orglibvorbis
1.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libvorbis
bookworm
1.3.7-1
fixed
bullseye
1.3.7-1
fixed
squeeze
no-dsa
sid
1.3.7-2
fixed
trixie
1.3.7-2
fixed
libvorbisidec
bookworm
1.2.1+git20180316-7
fixed
bullseye
1.2.1+git20180316-7
fixed
squeeze
no-dsa
sid
1.2.1+git20180316-8
fixed
trixie
1.2.1+git20180316-8
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libvorbis
intrepid
not-affected
hardy
Fixed 1.2.0.dfsg-2ubuntu0.1
released
gutsy
Fixed 1.2.0.dfsg-1ubuntu0.1
released
feisty
ignored
dapper
Fixed 1.1.2-0ubuntu2.3
released
Common Weakness Enumeration
References