Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q7j2-6vxr-m6xg

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.

Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.

EPSS

Процентиль: 92%
0.07819
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 17 лет назад

Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.

nvd
почти 17 лет назад

Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.

debian
почти 17 лет назад

Multiple integer overflows in the Audible::Tag::readTag function in me ...

EPSS

Процентиль: 92%
0.07819
Низкий

Дефекты

CWE-119