Vulnerability Details : CVE-2017-7586
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
Vulnerability category: Overflow
Products affected by CVE-2017-7586
- cpe:2.3:a:libsndfile_project:libsndfile:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-7586
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-7586
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2017-7586
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7586
-
http://www.securityfocus.com/bid/97522
libsndfile 'src/common.c' Stack Buffer Overflow Vulnerability
-
https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
src/ : Move to a variable length header buffer · erikd/libsndfile@708e996 · GitHubPatch
-
http://www.mega-nerd.com/libsndfile/#History
libsndfileProduct;Release Notes
-
http://www.mega-nerd.com/libsndfile/NEWS
Release Notes
-
https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236
src/id3.c : Improve error handling · erikd/libsndfile@f457b7b · GitHubPatch
-
https://security.gentoo.org/glsa/201707-04
libsndfile: Multiple vulnerabilities (GLSA 201707-04) — Gentoo security
Jump to