First published: Sun Nov 12 2017(Updated: )
The wav_convert2mono function in lib/wav.c in SWFTools 0.9.2 does not properly validate WAV data, which allows remote attackers to cause a denial of service (incorrect malloc and heap-based buffer overflow) or possibly have unspecified other impact via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SWFTools | =0.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16793 is classified as a high severity vulnerability due to its potential to cause denial of service and heap-based buffer overflow.
To mitigate CVE-2017-16793, upgrade to a patched version of SWFTools or apply any available security patches.
CVE-2017-16793 specifically affects SWFTools version 0.9.2.
The potential impacts of CVE-2017-16793 include denial of service and possible exploitation through crafted WAV files.
CVE-2017-16793 allows exploitation due to improper validation of WAV data in the wav_convert2mono function, leading to memory allocation issues.