Vulnerability Description
A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atomicparsley Project | Atomicparsley | 20210124.204813.840499f |
Related Weaknesses (CWE)
References
- https://github.com/wez/atomicparsley/issues/30ExploitPatchThird Party Advisory
- https://github.com/wez/atomicparsley/pull/31#issue-687280335Third Party Advisory
- https://security.gentoo.org/glsa/202305-01
- https://github.com/wez/atomicparsley/issues/30ExploitPatchThird Party Advisory
- https://github.com/wez/atomicparsley/pull/31#issue-687280335Third Party Advisory
- https://security.gentoo.org/glsa/202305-01
FAQ
What is CVE-2021-37231?
CVE-2021-37231 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.
How severe is CVE-2021-37231?
CVE-2021-37231 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-37231?
Check the references section above for vendor advisories and patch information. Affected products include: Atomicparsley Project Atomicparsley.