CVE-2014-0045CVE-2014-0045

Affected configuration(s):

cpe:/a:light_speed_gaming:mumble:1.1::~~~iphone_os~~
cpe:/a:light_speed_gaming:mumble:1.1:rc1:~~~iphone_os~~
cpe:/a:light_speed_gaming:mumble:1.1.1::~~~iphone_os~~
cpe:/a:light_speed_gaming:mumble:1.2::~~~iphone_os~~
cpe:/a:light_speed_gaming:mumble:1.2.1::~~~iphone_os~~
cpe:/a:light_speed_gaming:mumble:1.2.2::~~~iphone_os~~
cpe:/a:light_speed_gaming:mumble:1.2.3:rc1
cpe:/a:light_speed_gaming:mumble:1.2.3:rc2
cpe:/a:light_speed_gaming:mumble:1.2.3:rc3
cpe:/a:light_speed_gaming:mumble:1.2.4
cpe:/a:light_speed_gaming:mumblekit:-

Date published: 2014-02-07T19:55:06.177-05:00

Date last modified: 2016-12-30T21:59:10.637-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html

Summary: The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.