In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
References
Configurations
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.mega-nerd.com/libsndfile/#History - Product, Release Notes | |
References | () http://www.mega-nerd.com/libsndfile/NEWS - Release Notes | |
References | () http://www.securityfocus.com/bid/97522 - | |
References | () https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074 - Patch | |
References | () https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236 - Patch | |
References | () https://security.gentoo.org/glsa/201707-04 - |
Information
Published : 2017-04-07 20:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-7586
Mitre link : CVE-2017-7586
CVE.ORG link : CVE-2017-7586
JSON object : View
Products Affected
libsndfile_project
- libsndfile
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer