Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rfpj-4fj4-rm47

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.

The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.

EPSS

Процентиль: 58%
0.00371
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.

nvd
больше 15 лет назад

The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.

debian
больше 15 лет назад

The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, ( ...

EPSS

Процентиль: 58%
0.00371
Низкий