Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3814 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/03/13/3 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/97588 | Third Party Advisory VDB Entry |
https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-imadecodeblockwave-ima-cpp/ | Third Party Advisory VDB Entry |
https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831 | Exploit Third Party Advisory |
https://github.com/antlarr/audiofile/commit/a2e9eab8ea87c4ffc494d839ebb4ea145eb9f2e6 | Issue Tracking Patch Third Party Advisory |
https://github.com/mpruett/audiofile/issues/35 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2017-03-20 16:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-6831
Mitre link : CVE-2017-6831
CVE.ORG link : CVE-2017-6831
JSON object : View
Products Affected
debian
- debian_linux
audiofile
- audiofile
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer