Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-8373

Опубликовано: 01 мая 2017
Источник: debian
EPSS Низкий

Описание

The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libmadfixed0.15.1b-9package

Примечания

  • https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_layer_iii-layer3-c/

  • The patch from #508133 applied in 0.15.1b-4 only partially fixed it

  • "Duplicate with"/basically same as CVE-2017-8372

  • Patch in 0.15.1b-9: libmad-0.15.1b/debian/patches/md_size.diff

EPSS

Процентиль: 56%
0.00342
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.

CVSS3: 7.8
nvd
почти 9 лет назад

The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.

CVSS3: 7.8
github
больше 3 лет назад

The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.

suse-cvrf
больше 3 лет назад

Security update for libmad

EPSS

Процентиль: 56%
0.00342
Низкий