Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10683

Опубликовано: 29 июн. 2017
Источник: debian
EPSS Низкий

Описание

In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mpg123fixed1.25.1-1package
mpg123no-dsastretchpackage
mpg123no-dsajessiepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1465819

  • Duplicate of https://sourceforge.net/p/mpg123/bugs/252/

  • Patch: http://scm.orgis.org/view/mpg123/trunk/src/libmpg123/id3.c?sortby=date&r1=4249&r2=4248&pathrev=4249

EPSS

Процентиль: 71%
0.00666
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack.

CVSS3: 7.5
nvd
больше 8 лет назад

In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack.

suse-cvrf
больше 8 лет назад

Security update for mpg123

CVSS3: 7.5
github
больше 3 лет назад

In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack.

EPSS

Процентиль: 71%
0.00666
Низкий