First published: Fri Jan 16 2015(Updated: )
The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libsndfile | <1.0.26 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Debian GNU/Linux | =9.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Ubuntu Linux | =15.10 | |
Oracle Solaris SPARC | =11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9496 allows attackers to trigger an out-of-bounds read which can lead to various unspecified impacts.
CVE-2014-9496 affects libsndfile versions prior to 1.0.26 and several Linux distributions including specific versions of openSUSE, Debian, and Ubuntu.
To mitigate CVE-2014-9496, it is recommended to upgrade libsndfile to version 1.0.26 or later to eliminate the vulnerability.
The severity of CVE-2014-9496 is not defined, but out-of-bounds reads can lead to potential security risks.
CVE-2014-9496 can be exploited through crafted input that manipulates the map offset or rsrc marker.