Buffer overflow in the afReadFrames function in audiofile (aka libaudiofile and Audio File Library) allows user-assisted remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted audio file, as demonstrated by sixteen-stereo-to-eight-mono.c.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-2787-1 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/audiofile/+bug/1502721 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/10/06/2 | Mailing List Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170387.html | Third Party Advisory |
https://github.com/ccrisan/motioneyeos/blob/master/package/audiofile/0008-CVE-2015-7747.patch | Patch Third Party Advisory |
https://www.openwall.com/lists/oss-security/2015/10/08/1 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2020-02-19 13:15
Updated : 2020-04-13 07:23
NVD link : CVE-2015-7747
Mitre link : CVE-2015-7747
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
audio_file_library_project
- audio_file_library
canonical
- ubuntu_linux
fedoraproject
- fedora