First published: Tue May 04 2021(Updated: )
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libwebp | 0.6.1-2+deb10u1 0.6.1-2+deb10u3 0.6.1-2.1+deb11u2 1.2.4-0.2+deb12u1 1.3.2-0.3 | |
Webmproject Libwebp | <1.0.1 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
NetApp ONTAP Select Deploy administration utility | ||
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Apple iPadOS | =14.7 | |
Apple iPhone OS | =14.7 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
redhat/libwebp | <1.0.1 | 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-36328.
The severity of CVE-2020-36328 is critical with a CVSS score of 9.8.
CVE-2020-36328 poses a threat to data confidentiality, integrity, and system availability.
Versions before 1.0.1 of libwebp are affected by CVE-2020-36328.
You can find more information about CVE-2020-36328 in the provided references.