Submitted by Vincent (CVE) Danen on Thu, 09/17/2015 - 22:13
Integer overflow in the mid function in toolkit/tbytevector.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted file header field in a media file, which triggers a large memory allocation.
taglib is only used in client applications. We do not consider a user-assisted crash of a client application such as k3b or Totem to be a security issue.
CVE-2012-1584 taglib: integer overflow can crash application
Affected Packages State
|Red Hat Enterprise Linux 6||taglib||Affected|