libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/strukturag/libde265/issues/236 | issue tracking exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5346 | third party advisory vendor advisory |