CVE-2014-9756
CVSS5.0
发布时间 :2015-11-19 15:59:00
修订时间 :2016-12-06 22:01:42
NMP    

[原文]The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.


[CNNVD]CNNVD数据暂缺。


[机译]Google 翻译(企业版):

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-189 [数值错误]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9756
(官方数据源) NVD

- 其它链接及资源

http://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html
(UNKNOWN)  SUSE  openSUSE-SU-2015:1995
http://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html
(UNKNOWN)  SUSE  openSUSE-SU-2015:2119
http://www.openwall.com/lists/oss-security/2014/12/24/3
(UNKNOWN)  MLIST  [oss-security] 20141224 libsndfile DoS/divide-by-zero
http://www.openwall.com/lists/oss-security/2015/11/03/9
(UNKNOWN)  MLIST  [oss-security] 20151103 Re: libsndfile DoS/divide-by-zero
http://www.ubuntu.com/usn/USN-2832-1
(UNKNOWN)  UBUNTU  USN-2832-1
https://github.com/erikd/libsndfile/commit/725c7dbb95bfaf8b4bb7b04820e3a00cceea9ce6
(UNKNOWN)  CONFIRM  https://github.com/erikd/libsndfile/commit/725c7dbb95bfaf8b4bb7b04820e3a00cceea9ce6
https://github.com/erikd/libsndfile/issues/92
(UNKNOWN)  CONFIRM  https://github.com/erikd/libsndfile/issues/92

- 漏洞信息 (F134674)

Ubuntu Security Notice USN-2832-1 (PacketStormID:F134674)
2015-12-07 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,denial of service
linux,ubuntu
CVE-2014-9496,CVE-2014-9756,CVE-2015-7805
[点击下载]

Ubuntu Security Notice 2832-1 - It was discovered that libsndfile incorrectly handled memory when parsing malformed files. A remote attacker could use this issue to cause libsndfile to crash, resulting in a denial of service. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Joshua Rogers discovered that libsndfile incorrectly handled division when parsing malformed files. A remote attacker could use this issue to cause libsndfile to crash, resulting in a denial of service. Various other issues were also addressed.

============================================================================
Ubuntu Security Notice USN-2832-1
December 07, 2015

libsndfile vulnerabilities
============================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

libsndfile could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- libsndfile: Library for reading/writing audio files

Details:

It was discovered that libsndfile incorrectly handled memory when parsing
malformed files. A remote attacker could use this issue to cause
libsndfile to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9496)

Joshua Rogers discovered that libsndfile incorrectly handled division when
parsing malformed files. A remote attacker could use this issue to cause
libsndfile to crash, resulting in a denial of service. (CVE-2014-9756)

Marco Romano discovered that libsndfile incorrectly handled certain
malformed AIFF files. A remote attacker could use this issue to cause
libsndfile to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2015-7805)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
  libsndfile1                     1.0.25-9.1ubuntu0.15.10.1

Ubuntu 15.04:
  libsndfile1                     1.0.25-9.1ubuntu0.15.04.1

Ubuntu 14.04 LTS:
  libsndfile1                     1.0.25-7ubuntu2.1

Ubuntu 12.04 LTS:
  libsndfile1                     1.0.25-4ubuntu0.1

After a standard system update you need to restart your session to make
all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2832-1
  CVE-2014-9496, CVE-2014-9756, CVE-2015-7805

Package Information:
  https://launchpad.net/ubuntu/+source/libsndfile/1.0.25-9.1ubuntu0.15.10.1
  https://launchpad.net/ubuntu/+source/libsndfile/1.0.25-9.1ubuntu0.15.04.1
  https://launchpad.net/ubuntu/+source/libsndfile/1.0.25-7ubuntu2.1
  https://launchpad.net/ubuntu/+source/libsndfile/1.0.25-4ubuntu0.1
    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站