CVE-2020-36332Improper Input Validation in Libwebp

Severity
7.5HIGHNVD
EPSS
0.8%
top 25.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 21
Latest updateMay 24

Description

A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDwebmproject/libwebp< 1.0.1
Debianwebmproject/libwebp< 0.6.1-2.1+3
CVEListV5webmproject/libwebplibwebp 1.0.1

Also affects: Debian Linux 10.0, Enterprise Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-fx92-p77r-3r2c: A flaw was found in libwebp in versions before 12022-05-24
CVEList
CVE-2020-36332: A flaw was found in libwebp in versions before 12021-05-21
OSV
CVE-2020-36332: A flaw was found in libwebp in versions before 12021-05-21

📋Vendor Advisories

4
Ubuntu
libwebp vulnerabilities2021-06-01
Microsoft
A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.2021-05-11
Red Hat
libwebp: excessive memory allocation when reading a file2020-02-25
Debian
CVE-2020-36332: libwebp - A flaw was found in libwebp in versions before 1.0.1. When reading a file libweb...2020
CVE-2020-36332 — Improper Input Validation in Libwebp | cvebase