7.8
CVSSv3

CVE-2017-8373

Published: 01/05/2017 Updated: 20/05/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b allows remote malicious users to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

underbit mad libmad 0.15.1b

Vendor Advisories

Debian Bug report logs - #287519 libmad: Assertion failed; buffer overflow Package: libmad0; Maintainer for libmad0 is Kurt Roeckx <kurt@roeckxbe>; Source for libmad0 is src:libmad (PTS, buildd, popcon) Reported by: Justin Pryzby <justinpryzby@userssourceforgenet> Date: Tue, 28 Dec 2004 15:18:02 UTC Severity: imp ...
Several vulnerabilities were discovered in MAD, an MPEG audio decoder library, which could result in denial of service if a malformed audio file is processed For the oldstable distribution (jessie), these problems have been fixed in version 0151b-8+deb8u1 For the stable distribution (stretch), these problems have been fixed in version 0151b-8 ...