Vulnerabilities > CVE-2017-11546 - Divide By Zero vulnerability in Timidity++ Project Timidity++ 2.14.0
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
The insert_note_steps function in readmidi.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mid file. NOTE: a crash might be relevant when using the --background option.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_D37407BD5C5F11EABB2A8C164582FBAC.NASL description qflb.wu of DBAPPSecurity reports : Ihe insert_note_steps function in readmidi.c in TiMidity++ 2.14.0 can cause a denial of service(divide-by-zero error and application crash) via a crafted mid file. The resample_gauss function in resample.c in TiMidity++ 2.14.0 can cause a denial of service(heap-buffer-overflow) via a crafted mid file. The play_midi function in playmidi.c in TiMidity++ 2.14.0 can cause a denial of service(large loop and CPU consumption) via a crafted mid file. last seen 2020-03-18 modified 2020-03-06 plugin id 134258 published 2020-03-06 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134258 title FreeBSD : TiMidity++ -- Multiple vulnerabilities (d37407bd-5c5f-11ea-bb2a-8c164582fbac) NASL family Fedora Local Security Checks NASL id FEDORA_2018-7C2E288C5F.NASL description - Security fix for [CVE-2017-11546, CVE-2017-11547] - Fix the .desktop files so that opening a .mid file from a GUI filemanager works Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2019-01-03 plugin id 120556 published 2019-01-03 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/120556 title Fedora 28 : timidity++ (2018-7c2e288c5f) NASL family Fedora Local Security Checks NASL id FEDORA_2018-303A46D436.NASL description - Security fix for [CVE-2017-11546, CVE-2017-11547] - Fix the .desktop files so that opening a .mid file from a GUI filemanager works Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2018-06-21 plugin id 110626 published 2018-06-21 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110626 title Fedora 27 : timidity++ (2018-303a46d436) NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-208.NASL description This update for timidity fixes the following issues : Security issues fixed : - CVE-2017-11546: Fix division-by-zero with malformed MIDI file (boo#1081694) - CVE-2017-11547: Fix out-of-bound accesses in the resamplers (boo#1081694) Other issues fixed : - Drop tcl/tk dependency; it last seen 2020-06-05 modified 2018-02-26 plugin id 106999 published 2018-02-26 reporter This script is Copyright (C) 2018-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/106999 title openSUSE Security Update : timidity (openSUSE-2018-208)