GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html | issue tracking |
https://bugs.debian.org/883528#35 | third party advisory exploit |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html | third party advisory exploit |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html | third party advisory exploit |
http://www.securityfocus.com/bid/102116 | vdb entry third party advisory |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html | third party advisory exploit |
https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e | third party advisory patch |
https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html | third party advisory exploit |