Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16868

Опубликовано: 17 нояб. 2017
Источник: debian
EPSS Низкий

Описание

In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
swftoolsremovedpackage

Примечания

  • https://github.com/matthiaskramm/swftools/issues/52

  • Crash in CLI tool, no security impact

EPSS

Процентиль: 41%
0.00189
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 8 лет назад

In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file.

CVSS3: 5.5
nvd
около 8 лет назад

In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file.

CVSS3: 5.5
github
больше 3 лет назад

In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file.

EPSS

Процентиль: 41%
0.00189
Низкий