Description
The TDStretch::acceptNewOverlapLength function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted wav file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-18195 | The TDStretch::acceptNewOverlapLength function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted wav file. |
Ubuntu USN |
USN-4826-1 | SoundTouch vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:02:43.489Z
Reserved: 2017-05-28T00:00:00.000Z
Link: CVE-2017-9259
No data.
Status : Modified
Published: 2017-07-27T06:29:00.727
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-9259
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN