Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 626494 (CVE-2017-11720, CVE-2017-15018, CVE-2017-15019, CVE-2017-8419)

Summary: <media-sound/lame-3.100: Multiple vulnerabilities
Product: Gentoo Security Reporter: Christopher Díaz Riveros (RETIRED) <chrisadr>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: sound
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://sourceforge.net/p/lame/bugs/460/
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---

Description Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-07-29 00:01:50 UTC
From URL:

Overview:
I discovered an division by zero vulnerability in lame, which is caused by mal-constructed input file using American Fuzzy Loop.
Comment 1 Agostino Sarubbo gentoo-dev 2017-07-29 10:25:56 UTC
I'm pretty sure that is a duplicate of: https://blogs.gentoo.org/ago/2017/06/17/lame-divide-by-zero-in-parse_wave_header-get_audio-c/
Comment 2 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-10-19 17:02:31 UTC
CVE ID: CVE-2017-15018
   Summary: LAME 3.99.5 has a heap-based buffer over-read when handling a malformed file in k_34_4 in vbrquantize.c.


CVE ID: CVE-2017-15019
   Summary: LAME 3.99.5 has a NULL Pointer Dereference in the hip_decode_init function within libmp3lame/mpglib_interface.c via a malformed mpg file, because of an incorrect calloc call.


CVE ID: CVE-2017-8419
   Summary: LAME through 3.99.5 relies on the signed integer data type for values in a WAV or AIFF header, which allows remote attackers to cause a denial of service (stack-based buffer overflow or heap-based buffer overflow) or possibly have unspecified other impact via a crafted file, as demonstrated by mishandling of num_channels.

CVE ID: CVE-2017-11720
 Summary: There is a division-by-zero vulnerability in LAME 3.99.5, caused by a malformed input file.
Comment 3 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-01-15 16:07:44 UTC
Package is a B and the DoS rates a 3.  No PoC for ACE/RCE due to "unspecified impacts" wording in CVE.

GLSA Vote: No.

Cleanup will be handled in bug #634598