Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream.
References
Link | Resource |
---|---|
https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237 | Patch Third Party Advisory |
https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3 | Patch Third Party Advisory |
https://github.com/xbmc/xbmc/issues/20305 | Exploit Issue Tracking Third Party Advisory |
https://github.com/xbmc/xbmc/pull/20306 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html |
Configurations
History
23 Jan 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Nov 2021, 19:46
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
CPE | cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/xbmc/xbmc/pull/20306 - Patch, Third Party Advisory | |
References | (MISC) https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237 - Patch, Third Party Advisory | |
References | (MISC) https://github.com/xbmc/xbmc/issues/20305 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3 - Patch, Third Party Advisory |
01 Nov 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-01 19:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-42917
Mitre link : CVE-2021-42917
CVE.ORG link : CVE-2021-42917
JSON object : View
Products Affected
kodi
- kodi
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')