CVE-2023-51792

EUVD-2023-56476
Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attacker to cause a denial of service via the allocation size exceeding the maximum supported size of 0x10000000000.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.3 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CISA-ADPADP
3.3 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Debian logo
Debian Releases
Debian Product
Codename
libde265
bookworm
no-dsa
bullseye
no-dsa
bullseye (security)
vulnerable
buster
postponed
sid
1.0.15-1
fixed
trixie
1.0.15-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libde265
bionic
Fixed 1.0.2-2ubuntu0.18.04.1~esm5
released
focal
Fixed 1.0.4-1ubuntu0.4+esm1
released
jammy
Fixed 1.0.8-1ubuntu0.3+esm1
released
mantic
Fixed 1.0.12-2ubuntu0.2
released
noble
not-affected
oracular
not-affected
xenial
Fixed 1.0.2-2ubuntu0.16.04.1~esm5
released