// For flags

CVE-2017-15267

Ubuntu Security Notice USN-4641-1

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (3)
NVD, NVD, PS
CWE (1)
CWE-476: NULL Pointer Dereference
CAPEC (-)
Risk
CVSS Score
7.5 High
SSVC
-
KEV
-
EPSS
0.3%
Affected Products (-)
Vendors (1)
gnu
Products (1)
libextractor
Versions (1)
1.4
Intel Resources (1)
Advisories (1)
PacketStorm
Exploits (-)
-
Plugins (-)
-
References (5)
General (3)
openwall, securityfocus, debian
Exploits & POcs (1)
redhat
Patches (-)
Advisories (1)
gnu
Summary
Descriptions

In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c.

En GNU Libextractor 1.4, existe una desreferencia de puntero NULL en flac_metadata en flac_extractor.c.

It was discovered that Libextractor incorrectly handled zero sample rate. An attacker could possibly use this issue to cause a denial of service. It was discovered that Libextractor incorrectly handled certain FLAC metadata. An attacker could possibly use this issue to cause a denial of service. It was discovered that Libextractor incorrectly handled certain specially crafted files. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-10-11 CVE Reserved
  • 2017-10-11 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Threat Intelligence Resources (1)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Libextractor
Search vendor "Gnu" for product "Libextractor"
1.4
Search vendor "Gnu" for product "Libextractor" and version "1.4"
-
Affected