Описание
A flaw was found in the GNOME localsearch (previously known as tracker-miners) MP3 Extractor tracker-extract-mp3 component. A remote attacker could exploit this heap buffer overflow vulnerability by providing a specially crafted MP3 file containing malformed ID3 tags. This incorrect length calculation during the parsing of performer tags can lead to a read beyond the allocated buffer, potentially causing a Denial of Service (DoS) due to a crash or enabling information disclosure.
Отчет
This vulnerability has MODERATE impact. A heap buffer overflow in the GNOME localsearch MP3 Extractor (tracker-extract-mp3). A specially crafted MP3 file with malformed ID3 tags can cause the tracker-extract process to read beyond its allocated buffer. This can lead to a denial of service through application crashes or potentially information disclosure. This vulnerability requires local processing of a malicious MP3 file.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | tracker-miners | Fix deferred | ||
| Red Hat Enterprise Linux 8 | tracker-miners | Fix deferred | ||
| Red Hat Enterprise Linux 9 | tracker-miners | Fix deferred |
Показывать по
Дополнительная информация
Статус:
5.6 Medium
CVSS3
Связанные уязвимости
5.6 Medium
CVSS3