Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12797

Опубликовано: 29 авг. 2017
Источник: debian
EPSS Низкий

Описание

Integer overflow in the INT123_parse_new_id3 function in the ID3 parser in mpg123 before 1.25.5 on 32-bit platforms allows remote attackers to cause a denial of service via a crafted file, which triggers a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mpg123fixed1.25.6-1package
mpg123no-dsastretchpackage
mpg123no-dsajessiepackage
mpg123ignoredwheezypackage

Примечания

  • https://sourceforge.net/p/mpg123/bugs/254/

  • https://sourceforge.net/p/mpg123/mailman/message/35987663/

EPSS

Процентиль: 64%
0.00474
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

Integer overflow in the INT123_parse_new_id3 function in the ID3 parser in mpg123 before 1.25.5 on 32-bit platforms allows remote attackers to cause a denial of service via a crafted file, which triggers a heap-based buffer overflow.

CVSS3: 5.5
nvd
больше 8 лет назад

Integer overflow in the INT123_parse_new_id3 function in the ID3 parser in mpg123 before 1.25.5 on 32-bit platforms allows remote attackers to cause a denial of service via a crafted file, which triggers a heap-based buffer overflow.

suse-cvrf
больше 8 лет назад

Recommended update for mpg123

CVSS3: 5.5
github
больше 3 лет назад

Integer overflow in the INT123_parse_new_id3 function in the ID3 parser in mpg123 before 1.25.5 on 32-bit platforms allows remote attackers to cause a denial of service via a crafted file, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 64%
0.00474
Низкий