[Bug 1058449] New: VUL-0: CVE-2017-14409: mp3gain: A buffer overflow was discovered in III_dequantize_sample in layer3.c inmpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes anout-of-bounds write, which leads to remote denial of service or possibl
![](https://seccdn.libravatar.org/avatar/3035b38ff33cf86f480bb169b8500b80.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1058449 Bug ID: 1058449 Summary: VUL-0: CVE-2017-14409: mp3gain: A buffer overflow was discovered in III_dequantize_sample in layer3.c inmpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes anout-of-bounds write, which leads to remote denial of service or possibl Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Other Assignee: aloisio@gmx.com Reporter: meissner@suse.com QA Contact: qa-bugs@suse.de Found By: Security Response Team Blocker: --- CVE-2017-14409 A buffer overflow was discovered in III_dequantize_sample in layer3.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14409 https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-ii... -- You are receiving this mail because: You are on the CC list for the bug.
![](https://seccdn.libravatar.org/avatar/3035b38ff33cf86f480bb169b8500b80.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1058449 http://bugzilla.opensuse.org/show_bug.cgi?id=1058449#c1 Luigi Baldoni <aloisio@gmx.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |WONTFIX --- Comment #1 from Luigi Baldoni <aloisio@gmx.com> --- No longer supported upstream, not worth trying to fix it independently. Filed (dr#525071). -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com