
Cloud Vulnerability DB
A community-led vulnerabilities database
A stack buffer overflow vulnerability was discovered in AOM (Alliance for Open Media) version 2.0.1, specifically in the component src/aom_image.c. The vulnerability was assigned CVE-2020-36129 and was first recorded on January 4, 2021. This security issue affects the AOM codec implementation and has been given a CVSS 3.1 severity score of 8.8 (High) (Ubuntu CVE).
The vulnerability is classified as a stack buffer overflow issue located in the src/aom_image.c component of the AOM codebase. The severity assessment according to CVSS 3.1 metrics includes: Network attack vector, Low attack complexity, No privileges required, User interaction required, Unchanged scope, and High impact on confidentiality, integrity, and availability (Ubuntu CVE).
The vulnerability has received a High severity rating with a CVSS score of 8.8, indicating significant potential impact. The assessment shows high impact ratings for confidentiality, integrity, and availability, suggesting that successful exploitation could lead to serious security compromises in affected systems (Ubuntu CVE).
The vulnerability has been addressed in newer versions of the software. For Gentoo users, the recommendation is to upgrade to libaom version 3.2.0 or later using the command 'emerge --ask --oneshot --verbose ">=media-libs/libaom-3.2.0"' (Gentoo Advisory). Ubuntu users should note that versions 22.04 LTS and newer are not affected by this vulnerability (Ubuntu CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."