Vulnerabilities > CVE-2017-11546 - Divide By Zero vulnerability in Timidity++ Project Timidity++ 2.14.0

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL

Summary

The insert_note_steps function in readmidi.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mid file. NOTE: a crash might be relevant when using the --background option.

Vulnerable Configurations

Part Description Count
Application
Timidity\+\+_Project
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_D37407BD5C5F11EABB2A8C164582FBAC.NASL
    descriptionqflb.wu of DBAPPSecurity reports : Ihe insert_note_steps function in readmidi.c in TiMidity++ 2.14.0 can cause a denial of service(divide-by-zero error and application crash) via a crafted mid file. The resample_gauss function in resample.c in TiMidity++ 2.14.0 can cause a denial of service(heap-buffer-overflow) via a crafted mid file. The play_midi function in playmidi.c in TiMidity++ 2.14.0 can cause a denial of service(large loop and CPU consumption) via a crafted mid file.
    last seen2020-03-18
    modified2020-03-06
    plugin id134258
    published2020-03-06
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134258
    titleFreeBSD : TiMidity++ -- Multiple vulnerabilities (d37407bd-5c5f-11ea-bb2a-8c164582fbac)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-7C2E288C5F.NASL
    description - Security fix for [CVE-2017-11546, CVE-2017-11547] - Fix the .desktop files so that opening a .mid file from a GUI filemanager works Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2019-01-03
    plugin id120556
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120556
    titleFedora 28 : timidity++ (2018-7c2e288c5f)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-303A46D436.NASL
    description - Security fix for [CVE-2017-11546, CVE-2017-11547] - Fix the .desktop files so that opening a .mid file from a GUI filemanager works Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2018-06-21
    plugin id110626
    published2018-06-21
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/110626
    titleFedora 27 : timidity++ (2018-303a46d436)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-208.NASL
    descriptionThis update for timidity fixes the following issues : Security issues fixed : - CVE-2017-11546: Fix division-by-zero with malformed MIDI file (boo#1081694) - CVE-2017-11547: Fix out-of-bound accesses in the resamplers (boo#1081694) Other issues fixed : - Drop tcl/tk dependency; it
    last seen2020-06-05
    modified2018-02-26
    plugin id106999
    published2018-02-26
    reporterThis script is Copyright (C) 2018-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/106999
    titleopenSUSE Security Update : timidity (openSUSE-2018-208)