The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of libvpx: use after free via ParseContentEncodingEntry

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via ParseContentEncodingEntry() of libvpx, in order to trigger a denial of service, and possibly to run code.
Severity of this alert: 2/4.
Creation date: 13/01/2020.
Références of this alert: CVE-2019-2126, FEDORA-2020-65eac1b48b, VIGILANCE-VUL-31307.

Description of the vulnerability

An attacker can force the usage of a freed memory area via ParseContentEncodingE...
Full Vigil@nce bulletin... (Request your free trial)

This vulnerability impacts software or systems such as Fedora, Android OS.

Our Vigil@nce team determined that the severity of this security announce is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer vulnerability note.

Solutions for this threat

This vulnerability solution will be public soon.
Full Vigil@nce bulletin... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a networks vulnerabilities bulletin. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.