5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
45.8%
Package : libsndfile
Version : 1.0.25-9.1+deb7u1
CVE ID : CVE-2015-7805 CVE-2017-7585 CVE-2017-7586 CVE-2017-7741
CVE-2017-7742
Debian Bug : 860255
Multiple vulnerabilities were found in libsndfile, a popular library
for reading/writing audio files.
CVE-2017-7585
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()"
function (flac.c) can be exploited to cause a stack-based buffer
overflow via a specially crafted FLAC file.
CVE-2017-7586
In libsndfile before 1.0.28, an error in the "header_read()"
function (common.c) when handling ID3 tags can be exploited to
cause a stack-based buffer overflow via a specially crafted FLAC
file.
CVE-2017-7741
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()"
function (flac.c) can be exploited to cause a segmentation
violation (with write memory access) via a specially crafted FLAC
file during a resample attempt, a similar issue to CVE-2017-7585.
CVE-2017-7742
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()"
function (flac.c) can be exploited to cause a segmentation
violation (with read memory access) via a specially crafted FLAC
file during a resample attempt, a similar issue to
CVE-2017-7585.
CVE-2014-9496
The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows
attackers to have unspecified impact via vectors related to a (1)
map offset or (2) rsrc marker, which triggers an out-of-bounds
read.
CVE-2014-9756
The psf_fwrite function in file_io.c in libsndfile allows
attackers to cause a denial of service (divide-by-zero error and
application crash) via unspecified vectors related to the
headindex variable.
CVE-2015-7805
Heap-based buffer overflow in libsndfile 1.0.25 allows remote
attackers to have unspecified impact via the headindex value in
the header in an AIFF file.
For Debian 7 "Wheezy", these problems have been fixed in version
1.0.25-9.1+deb7u1.
We recommend that you upgrade your libsndfile packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
–
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | amd64 | libsndfile1 | < 1.0.25-9.1+deb7u1 | libsndfile1_1.0.25-9.1+deb7u1_amd64.deb |
Debian | 7 | armel | sndfile-programs | < 1.0.25-9.1+deb7u1 | sndfile-programs_1.0.25-9.1+deb7u1_armel.deb |
Debian | 7 | armhf | sndfile-programs | < 1.0.25-9.1+deb7u1 | sndfile-programs_1.0.25-9.1+deb7u1_armhf.deb |
Debian | 7 | armel | libsndfile1 | < 1.0.25-9.1+deb7u1 | libsndfile1_1.0.25-9.1+deb7u1_armel.deb |
Debian | 7 | armhf | libsndfile1 | < 1.0.25-9.1+deb7u1 | libsndfile1_1.0.25-9.1+deb7u1_armhf.deb |
Debian | 7 | all | libsndfile | < 1.0.25-9.1+deb7u1 | libsndfile_1.0.25-9.1+deb7u1_all.deb |
Debian | 7 | armel | libsndfile1-dev | < 1.0.25-9.1+deb7u1 | libsndfile1-dev_1.0.25-9.1+deb7u1_armel.deb |
Debian | 7 | amd64 | sndfile-programs | < 1.0.25-9.1+deb7u1 | sndfile-programs_1.0.25-9.1+deb7u1_amd64.deb |
Debian | 7 | amd64 | libsndfile1-dev | < 1.0.25-9.1+deb7u1 | libsndfile1-dev_1.0.25-9.1+deb7u1_amd64.deb |
Debian | 7 | i386 | libsndfile1 | < 1.0.25-9.1+deb7u1 | libsndfile1_1.0.25-9.1+deb7u1_i386.deb |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
45.8%