{"id":"CVE-2017-6831","details":"Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.","modified":"2026-03-20T11:21:56.948462Z","published":"2017-03-20T16:59:02.703Z","related":["MGASA-2017-0129","SUSE-SU-2017:0940-1","SUSE-SU-2017:1182-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3814"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2017/03/13/3"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/97588"},{"type":"ADVISORY","url":"https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-imadecodeblockwave-ima-cpp/"},{"type":"FIX","url":"https://github.com/antlarr/audiofile/commit/a2e9eab8ea87c4ffc494d839ebb4ea145eb9f2e6"},{"type":"FIX","url":"https://github.com/mpruett/audiofile/issues/35"},{"type":"EVIDENCE","url":"https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/antlarr/audiofile","events":[{"introduced":"0"},{"fixed":"a2e9eab8ea87c4ffc494d839ebb4ea145eb9f2e6"}]},{"type":"GIT","repo":"https://github.com/mpruett/audiofile","events":[{"introduced":"0"},{"last_affected":"f7d4869217acf7f4771d148002d4287f31e1c2d8"},{"introduced":"0"},{"last_affected":"fe639fca31befbfbdf1bf45c7593fff1386d67da"},{"introduced":"0"},{"last_affected":"382ed422033d53bd711ace66394c5249a5e214a4"},{"introduced":"0"},{"last_affected":"7113d9f09177e5f1919698fa4610936b0b0013b1"},{"introduced":"0"},{"last_affected":"bae63371740e659b25d3b780f059dcafdef9b25b"},{"introduced":"0"},{"last_affected":"2ff39015082e33b97e546c30ecb4170cd73b3285"},{"introduced":"0"},{"last_affected":"0fded995a7a29aac46bda56c84555048305c6bf8"},{"introduced":"0"},{"last_affected":"d19a5ace5ae891c778cbc710d78634de6084b846"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.2.7"},{"introduced":"0"},{"last_affected":"0.3.0"},{"introduced":"0"},{"last_affected":"0.3.1"},{"introduced":"0"},{"last_affected":"0.3.2"},{"introduced":"0"},{"last_affected":"0.3.3"},{"introduced":"0"},{"last_affected":"0.3.4"},{"introduced":"0"},{"last_affected":"0.3.5"},{"introduced":"0"},{"last_affected":"0.3.6"}]}}],"versions":["audiofile-0.2.1","audiofile-0.2.2","audiofile-0.2.3","audiofile-0.2.4","audiofile-0.2.5","audiofile-0.2.6","audiofile-0.2.7","audiofile-0.3.0","audiofile-0.3.1","audiofile-0.3.2","audiofile-0.3.3","audiofile-0.3.4","audiofile-0.3.5","audiofile-0.3.6"],"database_specific":{"vanir_signatures":[{"id":"CVE-2017-6831-314568ec","target":{"file":"libaudiofile/WAVE.cpp"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["331470145967194600774318625752253890445","232798939947800200754239479194282584567","219950778595101875391487318990529141915","9931794692818815536740976616195528411","313616948841340480450728645639032661791","185358438352405145440304294832130766911","668093673687982700959098601548676743","221765431166475582793187396825314521101"]},"source":"https://github.com/antlarr/audiofile/commit/a2e9eab8ea87c4ffc494d839ebb4ea145eb9f2e6","deprecated":false,"signature_version":"v1"},{"id":"CVE-2017-6831-571136c3","target":{"function":"WAVEFile::parseFormat","file":"libaudiofile/WAVE.cpp"},"signature_type":"Function","digest":{"length":5810,"function_hash":"90884721003669009012809751076469776921"},"source":"https://github.com/antlarr/audiofile/commit/a2e9eab8ea87c4ffc494d839ebb4ea145eb9f2e6","deprecated":false,"signature_version":"v1"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6831.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}