Miggo Logo

CVE-2023-51792:
Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attacker to cause a denial of...

3.3

CVSS Score
3.1

Basic Information

EPSS Score
0.05496%
Published
4/19/2024
Updated
7/3/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a buffer overflow due to an excessive allocation size. The issue #427 on GitHub, referenced in the vulnerability details, points to this problem. The commit 221e767136b8c46c748ae35b79ec9b976b3da301 fixes this issue by adding checks for the validity of conformance window parameters within the de265_image::alloc_image function. This function is responsible for image allocation and is where the excessive allocation could occur if the parameters are not validated. The ASAN log in the issue also points to convert_to_8bit and display_sdl in dec265.cc, but the core issue fixed in the commit is in alloc_image. The other functions are higher in the call stack and are affected by the incorrect allocation size originating from alloc_image or a similar allocation function if not alloc_image itself. However, the provided patch directly modifies alloc_image to prevent the oversized allocation, making it the most directly identifiable vulnerable function based on the patch. The other functions mentioned in the ASAN log (operator new[], convert_to_8bit, display_sdl, output_image, main) are part of the call chain leading to or utilizing the oversized allocation, but the root cause addressed by the patch is within alloc_image's logic for determining allocation size based on input parameters (conformance window).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u***r Ov*r*low vuln*r**ility in li****** v*.*.** *llows * lo**l *tt**k*r to **us* * **ni*l o* s*rvi** vi* t** *llo**tion siz* *x****in* t** m*ximum support** siz* o* *x***********.

Reasoning

T** vuln*r**ility is * *u***r ov*r*low *u* to *n *x**ssiv* *llo**tion siz*. T** issu* #*** on *it*u*, r***r*n*** in t** vuln*r**ility **t*ils, points to t*is pro*l*m. T** *ommit `****************************************` *ix*s t*is issu* *y ***in* **