Name | CVE-2017-8373 |
Description | The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1380-1, DSA-4192-1 |
Debian Bugs | 287519 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libmad (PTS) | bullseye | 0.15.1b-10 | fixed |
| bookworm | 0.15.1b-10.1 | fixed |
| sid, trixie | 0.15.1b-10.2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_layer_iii-layer3-c/
The patch from #508133 applied in 0.15.1b-4 only partially fixed it
"Duplicate with"/basically same as CVE-2017-8372
Patch in 0.15.1b-9: libmad-0.15.1b/debian/patches/md_size.diff