CRITICAL · 9.8

CVE-2020-36328

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulne...

Vulnerability Description

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
WebmprojectLibwebp< 1.0.1
RedhatEnterprise Linux7.0
NetappOntap Select Deploy Administration Utility-
DebianDebian Linux9.0
AppleIpados14.7
AppleIphone Os14.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-36328?

CVE-2020-36328 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulne...

How severe is CVE-2020-36328?

CVE-2020-36328 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2020-36328?

Check the references section above for vendor advisories and patch information. Affected products include: Webmproject Libwebp, Redhat Enterprise Linux, Netapp Ontap Select Deploy Administration Utility, Debian Debian Linux, Apple Ipados.