GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
References
Link | Resource |
---|---|
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html | Issue Tracking |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html | Exploit Third Party Advisory |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html | Exploit Third Party Advisory |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html | Exploit Third Party Advisory |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html | Exploit Third Party Advisory |
https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e | Patch Third Party Advisory |
https://bugs.debian.org/883528#35 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/102116 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-12-06 09:29
Updated : 2017-12-22 06:20
NVD link : CVE-2017-17440
Mitre link : CVE-2017-17440
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
gnu
- libextractor