CVE-2010-4203

WebM libvpx (aka the VP8 Codec SDK) before 0.9.5, as used in Google Chrome before 7.0.517.44, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via invalid frames.
References
Link Resource
http://code.google.com/p/chromium/issues/detail?id=60055 Exploit Issue Tracking Mailing List Vendor Advisory
http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html Release Notes Vendor Advisory
http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=blob%3Bf=CHANGELOG
http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=commit%3Bh=09bcc1f710ea65dc158639479288fb1908ff0c53
http://secunia.com/advisories/42109 Vendor Advisory
http://secunia.com/advisories/42118 Broken Link
http://secunia.com/advisories/42690 Broken Link
http://secunia.com/advisories/42908 Broken Link
http://security.gentoo.org/glsa/glsa-201101-03.xml Third Party Advisory
http://www.vupen.com/english/advisories/2011/0115 Permissions Required Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198 Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2010-0999.html Third Party Advisory
http://code.google.com/p/chromium/issues/detail?id=60055 Exploit Issue Tracking Mailing List Vendor Advisory
http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html Release Notes Vendor Advisory
http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=blob%3Bf=CHANGELOG
http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=commit%3Bh=09bcc1f710ea65dc158639479288fb1908ff0c53
http://secunia.com/advisories/42109 Vendor Advisory
http://secunia.com/advisories/42118 Broken Link
http://secunia.com/advisories/42690 Broken Link
http://secunia.com/advisories/42908 Broken Link
http://security.gentoo.org/glsa/glsa-201101-03.xml Third Party Advisory
http://www.vupen.com/english/advisories/2011/0115 Permissions Required Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198 Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2010-0999.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:webmproject:libvpx:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://code.google.com/p/chromium/issues/detail?id=60055 - Exploit, Issue Tracking, Mailing List, Vendor Advisory () http://code.google.com/p/chromium/issues/detail?id=60055 - Exploit, Issue Tracking, Mailing List, Vendor Advisory
References () http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html - Release Notes, Vendor Advisory
References () http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=blob%3Bf=CHANGELOG - () http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=blob%3Bf=CHANGELOG -
References () http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=commit%3Bh=09bcc1f710ea65dc158639479288fb1908ff0c53 - () http://review.webmproject.org/gitweb?p=libvpx.git%3Ba=commit%3Bh=09bcc1f710ea65dc158639479288fb1908ff0c53 -
References () http://secunia.com/advisories/42109 - Vendor Advisory () http://secunia.com/advisories/42109 - Vendor Advisory
References () http://secunia.com/advisories/42118 - Broken Link () http://secunia.com/advisories/42118 - Broken Link
References () http://secunia.com/advisories/42690 - Broken Link () http://secunia.com/advisories/42690 - Broken Link
References () http://secunia.com/advisories/42908 - Broken Link () http://secunia.com/advisories/42908 - Broken Link
References () http://security.gentoo.org/glsa/glsa-201101-03.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201101-03.xml - Third Party Advisory
References () http://www.vupen.com/english/advisories/2011/0115 - Permissions Required, Third Party Advisory () http://www.vupen.com/english/advisories/2011/0115 - Permissions Required, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198 - Third Party Advisory
References () https://rhn.redhat.com/errata/RHSA-2010-0999.html - Third Party Advisory () https://rhn.redhat.com/errata/RHSA-2010-0999.html - Third Party Advisory

Information

Published : 2010-11-06 00:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4203

Mitre link : CVE-2010-4203

CVE.ORG link : CVE-2010-4203


JSON object : View

Products Affected

redhat

  • enterprise_linux_desktop
  • enterprise_linux_workstation
  • enterprise_linux_server

webmproject

  • libvpx

google

  • chrome
CWE
CWE-190

Integer Overflow or Wraparound