Bug 1068682 - (CVE-2017-16868) VUL-0: CVE-2017-16868: swftools: The wav_convert2mono function does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause DoS
(CVE-2017-16868)
VUL-0: CVE-2017-16868: swftools: The wav_convert2mono function does not prope...
Status: RESOLVED NORESPONSE
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other openSUSE Factory
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/195267/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-11-17 12:04 UTC by Johannes Segitz
Modified: 2019-11-13 17:08 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Reproducer (48 bytes, audio/x-wav)
2017-11-17 12:04 UTC, Johannes Segitz
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2017-11-17 12:04:30 UTC
Created attachment 749176 [details]
Reproducer

CVE-2017-16868

In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not
properly restrict a multiplication within a malloc call, which allows
remote attackers to cause a denial of service (integer overflow and
NULL pointer dereference) via a crafted WAV file.

wav2swf 6_wav2swf_onlysegfault_nooutputinasan

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16868
Comment 1 Jan Engelhardt 2018-03-26 12:26:44 UTC
No fix available upstream.
Comment 2 Jan Engelhardt 2018-03-27 10:04:30 UTC
WONTFIX from my side. Reopen for the team.
Comment 3 Marcus Meissner 2019-11-13 17:08:38 UTC
swftools now longer is shipped or supported (last was 42.3)