Vulnerability Details : CVE-2016-9831
Heap-based buffer overflow in the parseSWF_RGBA function in parser.c in the listswf tool in libming 0.4.7 allows remote attackers to have unspecified impact via a crafted SWF file.
Vulnerability category: Overflow
Products affected by CVE-2016-9831
- cpe:2.3:a:libming:libming:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9831
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9831
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2016-9831
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-9831
-
http://www.securityfocus.com/bid/94767
libming 'parser.c' Heap Buffer Overflow Vulnerability
-
http://www.openwall.com/lists/oss-security/2016/12/01/6
oss-security - libming: listswf: heap-based buffer overflow in parseSWF_RGBA (parser.c)Exploit;Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/12/05/6
oss-security - Re: libming: listswf: heap-based buffer overflow in parseSWF_RGBA (parser.c)Mailing List;Third Party Advisory
-
https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_rgba-parser-c/
libming: listswf: heap-based buffer overflow in parseSWF_RGBA (parser.c) | agostino's blogExploit;Third Party Advisory;VDB Entry
Jump to