SB2017060515 - Fedora 24 update for libsndfile
Published: June 5, 2017 Updated: April 24, 2025
Security Bulletin ID
SB2017060515
Severity
Low
Patch available
YES
Number of vulnerabilities
4
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2017-8363)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to heap-based buffer over-read in the flac_buffer_copy function in flac.c in libsndfile. A remote attacker can send a specially crafted audio file, trick the victim into opening it, trigger memory corruption and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
2) Buffer over-read (CVE-ID: CVE-2017-8365)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to buffer over-read in the i2les_array function in pcm.c in libsndfile. A remote attacker can send a specially crafted audio file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
3) Out-of-bounds read (CVE-ID: CVE-2017-8362)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to out-of-bounds read in the flac_buffer_copy function in flac.c. A remote attacker can send a specially crafted audio file, trick the victim into opening it and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
4) Buffer overflow (CVE-ID: CVE-2017-8361)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to buffer overflow in the flac_buffer_copy function in flac.c. A remote attacker can send a specially crafted audio file, trick the victim into opening it, trigger memory corruption and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.