{"id":"CVE-2017-6828","details":"Heap-based buffer overflow in the readValue function in FileHandle.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted WAV file.","modified":"2026-03-20T11:21:47.066146Z","published":"2017-03-15T14:59:01.213Z","related":["MGASA-2017-0129","SUSE-SU-2017:0940-1","SUSE-SU-2017:1182-1","openSUSE-SU-2024:10640-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/97183"},{"type":"ADVISORY","url":"https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-readvalue-filehandle-cpp/"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3814"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mpruett/audiofile","events":[{"introduced":"0"},{"last_affected":"d19a5ace5ae891c778cbc710d78634de6084b846"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.3.6"}]}}],"versions":["audiofile-0.2.1","audiofile-0.2.2","audiofile-0.2.3","audiofile-0.2.4","audiofile-0.2.5","audiofile-0.2.6","audiofile-0.2.7","audiofile-0.3.0","audiofile-0.3.1","audiofile-0.3.2","audiofile-0.3.3","audiofile-0.3.4","audiofile-0.3.5","audiofile-0.3.6"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6828.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}