
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52339 affects libebml (Extensible Binary Meta Language library) versions before 1.4.5. The vulnerability was discovered in late 2023 and involves an integer overflow vulnerability in MemIOCallback.cpp that can occur when reading or writing data (NVD, GitHub Issue).
The vulnerability is an integer overflow condition in the MemIOCallback.cpp component that occurs during read and write operations. The issue manifests when the addition of two positive values results in a value smaller than one of the operands, indicating an arithmetic overflow. This vulnerability has been assigned a CVSS v3.1 Base Score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H (NVD).
When exploited, the integer overflow vulnerability can lead to buffer overflows, potentially causing application crashes or allowing unauthorized access to memory regions. The vulnerability primarily affects the availability of the system, as indicated by the CVSS scoring which shows high impact on availability but no direct impact on confidentiality or integrity (NVD).
The vulnerability has been fixed in libebml version 1.4.5. Users are advised to upgrade to this version or later. Various distributions have released security updates, including Debian 11 (bullseye) which fixed the issue in version 1.4.2-1+deb11u1, and Fedora which has released version 1.4.5-1 for both Fedora 38 and 39 (Debian LTS, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."