SB2018050803 - Debian update for libmad
Published: May 8, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2017-8372)
The vulnerability allows a remote attackert o casue DoS condition on the target system.The weakness exists in the mad_layer_III function in layer3.c due to assertion failure if NDEBUG is omitted. A remote attacker can submit a specially crafted audio file, trick the victim into opening it and cause the service to crash.
2) Heap-based buffer overflow (CVE-ID: CVE-2017-8373)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the mad_layer_III function in layer3.c due to heap-based buffer overflow. A remote attacker can submit a specially crafted audio file, trick the victim into opening it, trigger memory corruption and cause the service to crash.
3) Heap-based buffer over-read (CVE-ID: CVE-2017-8374)
The vulnerability allows a remote attacker to cause DoS condition on the target ystem.
The weakness exists in the mad_bit_skip function in bit.c due to heap-based buffer over-read. A remote attacker can submit a specially crafted audio file, trick the victim into opening it, trigger memory corruption and cause the service to crash.
Remediation
Install update from vendor's website.