First published: Mon May 27 2024(Updated: )
A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libvpx | <1.13.1 | 1.13.1 |
IBM QRadar Security Information and Event Manager | <=7.5 - 7.5.0 UP9 IF03 | |
IBM Security QRadar Incident Forensics | <=7.5 - 7.5.0 UP9 IF03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6349 is classified as a high severity vulnerability due to the potential for a heap overflow causing crashes or remote code execution.
To fix CVE-2023-6349, upgrade libvpx to version 1.13.1 or above.
CVE-2023-6349 affects libvpx and is also noted in IBM QRadar SIEM and QRadar Incident Forensics prior to version 7.5.0 UP9 IF03.
CVE-2023-6349 exploits a heap overflow vulnerability that occurs when encoding a frame with larger dimensions than originally configured.
Yes, CVE-2023-6349 can lead to security risks including potential remote code execution and application crashes.