Integer overflow in the mid function in toolkit/tbytevector.cpp in TagLib 1.7 and previous versions allows context-dependent malicious users to cause a denial of service (application crash) via a crafted file header field in a media file, which triggers a large memory allocation.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
scott wheeler taglib 1.1 |
||
scott wheeler taglib 1.6.3 |
||
scott wheeler taglib 1.2 |
||
scott wheeler taglib 1.3 |
||
scott wheeler taglib 1.6.1 |
||
scott wheeler taglib 1.6.2 |
||
scott wheeler taglib |
||
scott wheeler taglib 1.0 |
||
scott wheeler taglib 1.3.1 |
||
scott wheeler taglib 1.4 |
||
scott wheeler taglib 1.5 |
||
scott wheeler taglib 1.6 |