| Vulnerability Name: | CVE-2018-20360 (CCN-154612) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-12-17 | ||||||||||||||||||||||||||||||||||||
| Published: | 2018-12-17 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2022-04-22 | ||||||||||||||||||||||||||||||||||||
| Summary: | An invalid memory address dereference was discovered in the sbr_process_channel function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-20360 Source: XF Type: UNKNOWN faad2-cve201820360-dos(154612) Source: CCN Type: faad2 GIT Rep[ository Invalid memory address dereference in sbr_process_channel (in libfaad/sbr_dec.c:375) #32 Source: MISC Type: Exploit, Third Party Advisory https://github.com/knik0/faad2/issues/32 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20211024 [SECURITY] [DLA 2792-1] faad2 security update Source: GENTOO Type: Third Party Advisory GLSA-202006-17 Source: DEBIAN Type: Third Party Advisory DSA-5109 Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-20360 | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||