The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.debian.org/security/2016/dsa-3538 | vendor advisory |
https://github.com/Matroska-Org/libebml/commit/24e5cd7c666b1ddd85619d60486db0a5481c1b90 | |
http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html | vendor advisory |
http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html | mailing list vendor advisory |
https://github.com/Matroska-Org/libebml/blob/release-1.3.3/ChangeLog | vendor advisory |