Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15370

Опубликовано: 16 окт. 2017
Источник: debian
EPSS Низкий

Описание

There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
soxfixed14.4.2-2package
soxfixed14.4.1-5+deb9u2stretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1500554

  • https://github.com/mansr/sox/commit/ef3d8be0f80cbb650e4766b545d61e10d7a24c9e

EPSS

Процентиль: 52%
0.00294
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

CVSS3: 3.3
redhat
больше 7 лет назад

There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

CVSS3: 5.5
nvd
больше 7 лет назад

There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

CVSS3: 5.5
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 5.5
github
около 3 лет назад

There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

EPSS

Процентиль: 52%
0.00294
Низкий