In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
References
Link | Resource |
---|---|
https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html | |
https://secuniaresearch.flexerasoftware.com/advisories/76717/ | Third Party Advisory |
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/ | Third Party Advisory |
https://security.gentoo.org/glsa/201811-23 | |
https://usn.ubuntu.com/4013-1/ |
Configurations
History
No history.
Information
Published : 2017-06-12 16:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-6892
Mitre link : CVE-2017-6892
CVE.ORG link : CVE-2017-6892
JSON object : View
Products Affected
libsndfile_project
- libsndfile
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer