An issue was discovered in Exempi before 2.4.4. The ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via a crafted .asf file.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://cgit.freedesktop.org/exempi/commit/?id=fe59605d3520bf2ca4e0a963d194f10e9fee5806 | patch |
https://bugs.freedesktop.org/show_bug.cgi?id=102484 | third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html | third party advisory mailing list |
https://usn.ubuntu.com/3668-1/ | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2048 | vendor advisory |