First published: Thu Apr 26 2018(Updated: )
A flaw was found in libvorbis 1.3.6. The mapping0_forward function in mapping0.c file in Xiph.Org does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) via a crafted file. References: <a href="https://gitlab.xiph.org/xiph/vorbis/issues/2335">https://gitlab.xiph.org/xiph/vorbis/issues/2335</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libvorbisfile | =1.3.6 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10392 has been classified with a severity that allows for potential denial of service through heap-based buffer overflow or over-read.
To fix CVE-2018-10392, upgrade to a patched version of libvorbis that addresses the vulnerability.
CVE-2018-10392 specifically affects libvorbis version 1.3.6 due to improper channel validation.
Yes, CVE-2018-10392 can be exploited remotely by sending a crafted file to trigger the vulnerability.
Yes, CVE-2018-10392 is present on Debian 8.0, 9.0 and various Red Hat Enterprise Linux versions including 8.0 through 8.4.