Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream.
References
Link | Resource |
---|---|
https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237 | Patch Third Party Advisory |
https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3 | Patch Third Party Advisory |
https://github.com/xbmc/xbmc/issues/20305 | Exploit Issue Tracking Third Party Advisory |
https://github.com/xbmc/xbmc/pull/20306 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html |
Configurations
History
No history.
Information
Published : 2021-11-01 19:15
Updated : 2024-01-23 07:15
NVD link : CVE-2021-42917
Mitre link : CVE-2021-42917
CVE.ORG link : CVE-2021-42917
JSON object : View
Products Affected
kodi
- kodi
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')