Show plain JSON{"id": "CVE-2018-1000050", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2018-02-09T23:29:01.743", "references": [{"url": "https://github.com/nothings/stb/commit/244d83bc3d859293f55812d48b3db168e581f6ab", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "https://github.com/nothings/stb/commit/244d83bc3d859293f55812d48b3db168e581f6ab", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that can result in memory corruption, denial of service, comprised execution of host program. This attack appear to be exploitable via Victim must open a specially crafted Ogg Vorbis file. This vulnerability appears to have been fixed in 1.13."}, {"lang": "es", "value": "Sean Barrett stb_vorbis, en versiones 1.12 y anteriores, contiene una vulnerabilidad de desbordamiento de b\u00fafer en todas las rutas de decodificaci\u00f3n vorbis. Esto puede resultar en la corrupci\u00f3n de memoria, denegaci\u00f3n de servicio (DoS) o la ejecuci\u00f3n comprimida del programa host. Este ataque parece ser explotable mediante una v\u00edctima que abra un archivo Ogg Vorbis especialmente manipulado. Parece ser que la vulnerabilidad se ha solucionado en v1.13."}], "lastModified": "2024-11-21T03:39:31.687", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:stb_vorbis_project:stb_vorbis:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E01CD90-8F97-4675-A3CC-7D085A7250EA", "versionEndIncluding": "1.12"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}