CVE-2017-6828

NameCVE-2017-6828
DescriptionHeap-based buffer overflow in the readValue function in FileHandle.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted WAV file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-867-1, DSA-3814-1
NVD severitymedium (attack range: remote)
Debian Bugs857651

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
audiofile (PTS)wheezy0.3.4-2vulnerable
wheezy (security)0.3.4-2+deb7u1fixed
jessie (security), jessie0.3.6-2+deb8u2fixed
buster, sid, stretch0.3.6-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
audiofilesource(unstable)0.3.6-4medium857651
audiofilesourcejessie0.3.6-2+deb8u2mediumDSA-3814-1
audiofilesourcewheezy0.3.4-2+deb7u1mediumDLA-867-1

Notes

https://github.com/mpruett/audiofile/issues/31
https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-readvalue-filehandle-cpp
https://github.com/mpruett/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0

Search for package or bug name: Reporting problems