ID CVE-2017-17457
Summary The function d2ulaw_array() in ulaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address 0x000000000000), a different vulnerability than CVE-2017-14246.
References
Vulnerable Configurations
  • cpe:2.3:a:libsndfile_project:libsndfile:1.0.29:pre1
    cpe:2.3:a:libsndfile_project:libsndfile:1.0.29:pre1
CVSS
Base: 4.3
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
nessus via4
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_30704ABA1DA411E8B6AA4CCC6ADDA413.NASL
    description Xin-Jiang on Github reports : CVE-2017-14245 (Medium): An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values. CVE-2017-14246 (Medium): An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values. my123px on Github reports : CVE-2017-17456 (Medium): The function d2alaw_array() in alaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address 0x000000000000), a different vulnerability than CVE-2017-14245. CVE-2017-17457 (Medium): The function d2ulaw_array() in ulaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address 0x000000000000), a different vulnerability than CVE-2017-14246.
    last seen 2018-03-03
    modified 2018-03-02
    plugin id 107110
    published 2018-03-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107110
    title FreeBSD : libsndfile -- out-of-bounds reads (30704aba-1da4-11e8-b6aa-4ccc6adda413)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-2065-1.NASL
    description This update for libsndfile fixes the following issues: Security issues fixed : - CVE-2018-13139: Fix a stack-based buffer overflow in psf_memset in common.c that allows remote attackers to cause a denial of service (bsc#1100167). - CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777) - CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-07-31
    modified 2018-07-30
    plugin id 111369
    published 2018-07-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111369
    title SUSE SLED12 / SLES12 Security Update : libsndfile (SUSE-SU-2018:2065-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-806.NASL
    description This update for libsndfile fixes the following issues : Security issues fixed : - CVE-2018-13139: Fix a stack-based buffer overflow in psf_memset in common.c that allows remote attackers to cause a denial of service (bsc#1100167). - CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777) - CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767) This update was imported from the SUSE:SLE-15:Update update project.
    last seen 2018-08-10
    modified 2018-08-07
    plugin id 111568
    published 2018-08-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111568
    title openSUSE Security Update : libsndfile (openSUSE-2018-806)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-804.NASL
    description This update for libsndfile fixes the following issues : Security issues fixed : - CVE-2018-13139: Fix a stack-based buffer overflow in psf_memset in common.c that allows remote attackers to cause a denial of service (bsc#1100167). - CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777) - CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2018-08-10
    modified 2018-08-07
    plugin id 111566
    published 2018-08-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111566
    title openSUSE Security Update : libsndfile (openSUSE-2018-804)
refmap via4
misc https://github.com/erikd/libsndfile/issues/344
Last major update 07-12-2017 - 03:29
Published 07-12-2017 - 03:29
Last modified 22-12-2017 - 13:15
Back to Top