CVE-2018-14347
Published: 17 July 2018
GNU Libextractor before 1.7 contains an infinite loop vulnerability in EXTRACTOR_mpeg_extract_method (mpeg_extractor.c).
From the Ubuntu security team
It was discovered that Libextractor incorrectly handled malformed files. An attacker could possibly use this issue to cause a denial of service.
Priority
CVSS 3 base score: 6.5
Status
Package | Release | Status |
---|---|---|
libextractor Launchpad, Ubuntu, Debian |
artful |
Ignored
(reached end-of-life)
|
bionic |
Needed
|
|
cosmic |
Ignored
(reached end-of-life)
|
|
disco |
Not vulnerable
(1:1.7-1)
|
|
eoan |
Not vulnerable
(1:1.7-1)
|
|
focal |
Not vulnerable
(1:1.7-1)
|
|
groovy |
Not vulnerable
(1:1.7-1)
|
|
hirsute |
Not vulnerable
(1:1.7-1)
|
|
impish |
Not vulnerable
(1:1.7-1)
|
|
jammy |
Not vulnerable
(1:1.7-1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Needed
(1:1.7-1)
|
|
xenial |
Released
(1:1.3-4+deb9u3build0.16.04.1)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
- http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html
- https://gnunet.org/bugs/view.php?id=5399
- https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394
- https://ubuntu.com/security/notices/USN-4641-1
- NVD
- Launchpad
- Debian