CVE-2014-0044

The opus_packet_get_samples_per_frame function in client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots allows remote attackers to cause a denial of service (crash) via a crafted length prefix value, which triggers a NULL pointer dereference or a heap-based buffer over-read (aka "out-of-bounds array access").
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc1:*:*:*:*:*:*
cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc2:*:*:*:*:*:*
cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc3:*:*:*:*:*:*
cpe:2.3:a:light_speed_gaming:mumble:1.2.4:*:*:*:*:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html - () http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html -
References () http://mumble.info/security/Mumble-SA-2014-001.txt - Vendor Advisory () http://mumble.info/security/Mumble-SA-2014-001.txt - Vendor Advisory
References () http://osvdb.org/102904 - () http://osvdb.org/102904 -
References () http://www.debian.org/security/2014/dsa-2854 - () http://www.debian.org/security/2014/dsa-2854 -

Information

Published : 2014-02-08 00:55

Updated : 2025-04-11 00:51


NVD link : CVE-2014-0044

Mitre link : CVE-2014-0044

CVE.ORG link : CVE-2014-0044


JSON object : View

Products Affected

light_speed_gaming

  • mumble
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer