Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11547

Опубликовано: 31 июл. 2017
Источник: debian
EPSS Низкий

Описание

The resample_gauss function in resample.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mid file. NOTE: a crash might be relevant when using the --background option. NOTE: the TiMidity++ README.alsaseq documentation suggests a setuid-root installation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
timidityfixed2.14.0-4package

Примечания

  • http://seclists.org/fulldisclosure/2017/Jul/83

  • https://sourceforge.net/p/timidity/discussion/217458/thread/9a1c9620/

  • Crash in CLI tool, no security impact

EPSS

Процентиль: 43%
0.00209
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

The resample_gauss function in resample.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mid file. NOTE: a crash might be relevant when using the --background option. NOTE: the TiMidity++ README.alsaseq documentation suggests a setuid-root installation.

CVSS3: 5.5
nvd
больше 8 лет назад

The resample_gauss function in resample.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mid file. NOTE: a crash might be relevant when using the --background option. NOTE: the TiMidity++ README.alsaseq documentation suggests a setuid-root installation.

CVSS3: 5.5
github
больше 3 лет назад

The resample_gauss function in resample.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mid file. NOTE: a crash might be relevant when using the --background option. NOTE: the TiMidity++ README.alsaseq documentation suggests a setuid-root installation.

suse-cvrf
почти 8 лет назад

Security update for timidity

EPSS

Процентиль: 43%
0.00209
Низкий