Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-9101 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
lame (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU33999
Risk: Medium
CVSSv3.1: 4.8 [AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2015-9101
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.99.5. A remote attacker can perform a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
MitigationInstall update from vendor's website.
Vulnerable software versionslame (Alpine package): 3.99.5-r0 - 3.99.5-r5
CPE2.3http://git.alpinelinux.org/aports/commit/?id=a050919028df7e95af6ae9babd244b81504363cd
http://git.alpinelinux.org/aports/commit/?id=b4613423f9e2e77ef531c4ee48f860e896f2da1d
http://git.alpinelinux.org/aports/commit/?id=ef6ff77b8dc502dac851b839126109c115bb4326
http://git.alpinelinux.org/aports/commit/?id=ff08de0745689aeee1834062c6ed577d0c3cd1aa
http://git.alpinelinux.org/aports/commit/?id=1900edcab539a7ab32e3ad868597f7358fa798ad
http://git.alpinelinux.org/aports/commit/?id=22711d8124dcf1724b3b0ae900bf89567c5b979a
http://git.alpinelinux.org/aports/commit/?id=c6826747b05fd69a8385c80f7ba19d2260dd32ba
http://git.alpinelinux.org/aports/commit/?id=7f60893b079de3f360f2d63a76079f32a019f042
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.