Vigil@nce - libav: memory corruption via av_packet_ref, analyzed on 02/09/2019


The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.



Recent vulnerabilities
Tracked products
RSS feed
Vulnerability





Synthesis of the vulnerability


An attacker can trigger a memory corruption via av_packet_ref() of libav, in order to trigger a denial of service, and possibly to run code.Severity of this threat: 2/4.Creation date: 02/09/2019.Références of this weakness: CVE-2018-5766, DLA-1907-1, VIGILANCE-VUL-30218.Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability


An attacker can trigger a memory corruption via av_packet_ref() of libav, in order to trigger a denial of service, and possibly to run code.Full Vigil@nce bulletin... (Free trial)

This computer vulnerability announce impacts software or systems such as Debian.

Our Vigil@nce team determined that the severity of this cybersecurity bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this threat alert ..

Support the originator by clicking the read the rest link below.