Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-14247

Опубликовано: 24 июл. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3
CVSS3: 5.5

Описание

The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

0.3.2-2
disco

not-affected

0.3.2-2
eoan

not-affected

0.3.2-2
esm-apps/bionic

needed

esm-apps/focal

not-affected

0.3.2-2
esm-apps/jammy

not-affected

0.3.2-2
esm-apps/noble

not-affected

0.3.2-2
esm-apps/xenial

needed

esm-infra-legacy/trusty

DNE

Показывать по

4.3 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
больше 6 лет назад

The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.

CVSS3: 5.5
nvd
больше 6 лет назад

The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.

CVSS3: 5.5
debian
больше 6 лет назад

The scan() function in mad.c in mpg321 0.3.2 allows remote attackers t ...

CVSS3: 5.5
github
больше 3 лет назад

The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.

4.3 Medium

CVSS2

5.5 Medium

CVSS3