First published: Sat Feb 23 2013(Updated: )
Integer overflow in the padding implementation in the opus_packet_parse_impl function in src/opus_decoder.c in Opus before 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a long packet.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opus Codec | <1.0.2 | |
Google Chrome | ||
Google Chrome | <25.0.1364.97 | |
Linux Kernel | ||
Microsoft Windows | ||
Google Chrome | <25.0.1364.99 | |
iPadOS | ||
Apple iPhone OS | ||
macOS Yosemite | ||
Apple macOS | ||
openSUSE | =12.1 | |
openSUSE | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0899 has a high severity rating due to its potential to cause denial of service attacks.
To fix CVE-2013-0899, update the Opus codec to version 1.0.2 or later.
CVE-2013-0899 affects Google Chrome versions prior to 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X.
CVE-2013-0899 impacts systems running vulnerable versions of the Opus codec alongside certain older versions of Google Chrome.
CVE-2013-0899 is primarily an integer overflow vulnerability found in the padding implementation of the Opus codec.