The mad_bit_skip function in bit.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
References
Link | Resource |
---|---|
https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_bit_skip-bit-c/ | Exploit Third Party Advisory VDB Entry |
https://www.debian.org/security/2018/dsa-4192 | |
https://lists.debian.org/debian-lts-announce/2018/05/msg00011.html |
Configurations
Information
Published : 2017-04-30 18:59
Updated : 2018-05-19 18:29
NVD link : CVE-2017-8374
Mitre link : CVE-2017-8374
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
underbit
- mad_libmad