Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7586

Опубликовано: 07 апр. 2017
Источник: debian
EPSS Низкий

Описание

In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libsndfilefixed1.0.27-2package
libsndfileno-dsajessiepackage

Примечания

  • https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074

  • https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236

  • 1.0.27-2 in unstable contain fix_bufferoverflows.patch meant to address this issue

  • https://sources.debian.org/data/main/libs/libsndfile/1.0.27-2/debian/patches/fix_bufferoverflows.patch

EPSS

Процентиль: 54%
0.00318
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

CVSS3: 3.3
redhat
почти 9 лет назад

In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

CVSS3: 5.5
nvd
почти 9 лет назад

In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

CVSS3: 5.5
github
больше 3 лет назад

In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

suse-cvrf
почти 9 лет назад

Security update for libsndfile

EPSS

Процентиль: 54%
0.00318
Низкий