{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-5197","assignerOrgId":"14ed7db2-1595-443d-9d34-6215bf890778","state":"PUBLISHED","assignerShortName":"Google","dateReserved":"2024-05-22T09:42:54.906Z","datePublished":"2024-06-03T13:30:26.925Z","dateUpdated":"2025-02-13T17:54:05.905Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://chromium.googlesource.com/webm/","defaultStatus":"unaffected","packageName":"libvpx","product":"libvpx","programFiles":["https://chromium.googlesource.com/webm/libvpx/+/refs/heads/main/vpx/src/vpx_image.c"],"programRoutines":[{"name":"vpx_img_alloc()"},{"name":"vpx_img_wrap()"}],"repo":"https://chromium.googlesource.com","vendor":"Chromium","versions":[{"lessThan":"1.14.1","status":"affected","version":"0","versionType":"semver"}]}],"datePublic":"2024-04-02T10:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"There exists interger overflows in libvpx in versions prior to 1.14.1.&nbsp;<span style=\"background-color: var(--wht);\">Calling </span><code>vpx_img_alloc()</code><span style=\"background-color: var(--wht);\">&nbsp;with a large value of the </span><code>d_w</code><span style=\"background-color: var(--wht);\">, </span><code>d_h</code><span style=\"background-color: var(--wht);\">, or </span><code>align</code><span style=\"background-color: var(--wht);\">&nbsp;parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned </span><code>vpx_image_t</code><span style=\"background-color: var(--wht);\">&nbsp;struct may be invalid.&nbsp;</span><span style=\"background-color: var(--wht);\">Calling </span><code>vpx_img_wrap()</code><span style=\"background-color: var(--wht);\">&nbsp;with a large value of the </span><code>d_w</code><span style=\"background-color: var(--wht);\">, </span><code>d_h</code><span style=\"background-color: var(--wht);\">, or </span><code>stride_align</code><span style=\"background-color: var(--wht);\">&nbsp;parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned </span><code>vpx_image_t</code><span style=\"background-color: var(--wht);\">&nbsp;struct may be invalid. We recommend upgrading to version 1.14.1 or beyond</span><span style=\"background-color: var(--wht);\"><br></span><br><br>"}],"value":"There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond"}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":5.9,"baseSeverity":"MEDIUM","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:H/VA:N/SC:L/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-190","description":"CWE-190 Integer Overflow or Wraparound","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"14ed7db2-1595-443d-9d34-6215bf890778","shortName":"Google","dateUpdated":"2024-06-16T21:05:48.990Z"},"references":[{"url":"https://g-issues.chromium.org/issues/332382766"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html"}],"source":{"discovery":"UNKNOWN"},"title":"Integer overflow in libvpx","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-5197","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-06-03T17:27:56.300102Z"}}}],"affected":[{"cpes":["cpe:2.3:a:chromium:libvpx:*:*:*:*:*:*:*:*"],"vendor":"chromium","product":"libvpx","versions":[{"status":"affected","version":"0","lessThan":"1.14.1","versionType":"semver"}],"defaultStatus":"unaffected"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T18:02:28.171Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:03:11.058Z"},"title":"CVE Program Container","references":[{"url":"https://g-issues.chromium.org/issues/332382766","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html","tags":["x_transferred"]}]}]},"dataVersion":"5.1"}