CVE-2020-36646

A vulnerability classified as problematic has been found in MediaArea ZenLib up to 0.4.38. This affects the function Ztring::Date_From_Seconds_1970_Local of the file Source/ZenLib/Ztring.cpp. The manipulation of the argument Value leads to unchecked return value to null pointer dereference. Upgrading to version 0.4.39 is able to address this issue. The identifier of the patch is 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408. It is recommended to upgrade the affected component. The identifier VDB-217629 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mediaarea:zenlib:*:*:*:*:*:*:*:*

History

11 Apr 2024, 01:08

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en MediaArea ZenLib hasta la versión 0.4.38 y se ha clasificado como problemática. Esto afecta a la función Ztring::Date_From_Seconds_1970_Local del archivo Source/ZenLib/Ztring.cpp. La manipulación del argumento Valor conduce a un valor de retorno no verificado a una desreferencia de puntero nulo. La actualización a la versión 0.4.39 puede solucionar este problema. El identificador del parche es 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asignó el identificador VDB-217629.

20 Oct 2023, 14:15

Type Values Removed Values Added
Summary A vulnerability classified as problematic has been found in MediaArea ZenLib up to 0.4.38. This affects the function Ztring::Date_From_Seconds_1970_Local of the file Source/ZenLib/Ztring.cpp. The manipulation of the argument Value leads to unchecked return value to null pointer dereference. Upgrading to version 0.4.39 is able to address this issue. The name of the patch is 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408. It is recommended to upgrade the affected component. The identifier VDB-217629 was assigned to this vulnerability. A vulnerability classified as problematic has been found in MediaArea ZenLib up to 0.4.38. This affects the function Ztring::Date_From_Seconds_1970_Local of the file Source/ZenLib/Ztring.cpp. The manipulation of the argument Value leads to unchecked return value to null pointer dereference. Upgrading to version 0.4.39 is able to address this issue. The identifier of the patch is 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408. It is recommended to upgrade the affected component. The identifier VDB-217629 was assigned to this vulnerability.

12 Jan 2023, 20:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Mediaarea zenlib
Mediaarea
CWE CWE-690 CWE-476
CPE cpe:2.3:a:mediaarea:zenlib:*:*:*:*:*:*:*:*
References (MISC) https://github.com/MediaArea/ZenLib/commit/6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408 - (MISC) https://github.com/MediaArea/ZenLib/commit/6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408 - Patch, Third Party Advisory
References (MISC) https://github.com/MediaArea/ZenLib/pull/119 - (MISC) https://github.com/MediaArea/ZenLib/pull/119 - Patch, Third Party Advisory
References (MISC) https://vuldb.com/?ctiid.217629 - (MISC) https://vuldb.com/?ctiid.217629 - Third Party Advisory, VDB Entry
References (MISC) https://vuldb.com/?id.217629 - (MISC) https://vuldb.com/?id.217629 - Third Party Advisory, VDB Entry
References (MISC) https://github.com/MediaArea/ZenLib/releases/tag/v0.4.39 - (MISC) https://github.com/MediaArea/ZenLib/releases/tag/v0.4.39 - Release Notes, Third Party Advisory

07 Jan 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-07 20:15

Updated : 2024-04-11 01:08


NVD link : CVE-2020-36646

Mitre link : CVE-2020-36646

CVE.ORG link : CVE-2020-36646


JSON object : View

Products Affected

mediaarea

  • zenlib
CWE
CWE-476

NULL Pointer Dereference

CWE-690

Unchecked Return Value to NULL Pointer Dereference