Vulnerability CVE-2014-0045


Published: 2014-02-07   Modified: 2014-02-08

Description:
The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write.

See advisories in our WLB2 database:
Topic
Author
Date
High
Mumble heap-based buffer overflow
Mumble
09.02.2014

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Light speed gaming -> Mumble 
Light speed gaming -> Mumblekit 

 References:
http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html
http://mumble.info/security/Mumble-SA-2014-002.txt
http://mumble.info/security/Mumble-SA-2014-004.txt
http://www.debian.org/security/2014/dsa-2854
http://www.securityfocus.com/bid/65374

Copyright 2024, cxsecurity.com

 

Back to Top