Description
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
References (6)
Core 6
Core References
Patch x_refsource_confirm
https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
Product, Release Notes x_refsource_confirm
http://www.mega-nerd.com/libsndfile/#History
Release Notes x_refsource_confirm
http://www.mega-nerd.com/libsndfile/NEWS
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201707-04
Patch x_refsource_confirm
https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/97522
Scores
CVSS v3
5.5
EPSS
0.0034
EPSS Percentile
56.9%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-119
Status
published
Products (1)
libsndfile_project/libsndfile
< 1.0.27
Published
Apr 07, 2017
Tracked Since
Feb 18, 2026