Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 626494 (CVE-2017-11720, CVE-2017-15018, CVE-2017-15019, CVE-2017-8419) - <media-sound/lame-3.100: Multiple vulnerabilities
Summary: <media-sound/lame-3.100: Multiple vulnerabilities
Alias: CVE-2017-11720, CVE-2017-15018, CVE-2017-15019, CVE-2017-8419
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: B3 [noglsa cve]
Depends on:
Reported: 2017-07-29 00:01 UTC by Christopher Díaz Riveros (RETIRED)
Modified: 2018-01-15 16:07 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-07-29 00:01:50 UTC
From URL:

I discovered an division by zero vulnerability in lame, which is caused by mal-constructed input file using American Fuzzy Loop.
Comment 1 Agostino Sarubbo gentoo-dev 2017-07-29 10:25:56 UTC
I'm pretty sure that is a duplicate of:
Comment 2 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-10-19 17:02:31 UTC
CVE ID: CVE-2017-15018
   Summary: LAME 3.99.5 has a heap-based buffer over-read when handling a malformed file in k_34_4 in vbrquantize.c.

CVE ID: CVE-2017-15019
   Summary: LAME 3.99.5 has a NULL Pointer Dereference in the hip_decode_init function within libmp3lame/mpglib_interface.c via a malformed mpg file, because of an incorrect calloc call.

CVE ID: CVE-2017-8419
   Summary: LAME through 3.99.5 relies on the signed integer data type for values in a WAV or AIFF header, which allows remote attackers to cause a denial of service (stack-based buffer overflow or heap-based buffer overflow) or possibly have unspecified other impact via a crafted file, as demonstrated by mishandling of num_channels.

CVE ID: CVE-2017-11720
 Summary: There is a division-by-zero vulnerability in LAME 3.99.5, caused by a malformed input file.
Comment 3 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-01-15 16:07:44 UTC
Package is a B and the DoS rates a 3.  No PoC for ACE/RCE due to "unspecified impacts" wording in CVE.

GLSA Vote: No.

Cleanup will be handled in bug #634598