Описание
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:mpg321_project:mpg321:0.3.2:*:*:*:*:*:*:*
EPSS
Процентиль: 43%
0.00209
Низкий
5.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 5.5
ubuntu
больше 6 лет назад
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
CVSS3: 5.5
redhat
больше 6 лет назад
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
CVSS3: 5.5
debian
больше 6 лет назад
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers t ...
CVSS3: 5.5
github
больше 3 лет назад
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
EPSS
Процентиль: 43%
0.00209
Низкий
5.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-787