aubio up to 0.4.8 filterbank new_aubio_filterbank Argument denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 2.9 | $0-$5k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in aubio up to 0.4.8. Affected by this vulnerability is the function new_aubio_filterbank of the component filterbank. The manipulation as part of Argument leads to denial of service.
This vulnerability is listed as CVE-2019-1010222. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Details
A vulnerability, which was classified as problematic, has been found in aubio up to 0.4.8. This issue affects the function new_aubio_filterbank of the component filterbank. The manipulation as part of a Argument leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. Impacted is availability. The summary by CVE is:
aubio 0.4.8 and earlier is affected by: null pointer. The impact is: crash. The component is: filterbank. The attack vector is: pass invalid arguments to new_aubio_filterbank. The fixed version is: after commit eda95c9c22b4f0b466ae94c4708765eaae6e709e.
The weakness was presented 07/22/2019 (GitHub Repository). The advisory is shared at github.com. The identification of this vulnerability is CVE-2019-1010222 since 03/20/2019. Technical details are known, but no exploit is available.
Applying the patch eda95c9c22b4f0b466ae94c4708765eaae6e709e is able to eliminate this problem.
See VDB-138415 and VDB-138414 for similar entries. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Name
Version
License
Website
- Product: https://github.com/aubio/aubio/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.3VulDB Meta Temp Score: 2.9
VulDB Base Score: 3.3
VulDB Temp Score: 2.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: eda95c9c22b4f0b466ae94c4708765eaae6e709e
Timeline
03/20/2019 🔍07/22/2019 🔍
07/23/2019 🔍
11/05/2023 🔍
Sources
Product: github.comAdvisory: eda95c9c22b4f0b466ae94c4708765eaae6e709e
Status: Not defined
CVE: CVE-2019-1010222 (🔍)
GCVE (CVE): GCVE-0-2019-1010222
GCVE (VulDB): GCVE-100-138413
See also: 🔍
Entry
Created: 07/23/2019 06:35 AMUpdated: 11/05/2023 10:01 AM
Changes: 07/23/2019 06:35 AM (40), 07/09/2020 09:46 AM (3), 11/05/2023 10:01 AM (10)
Complete: 🔍
Cache ID: 244:D23:40
No comments yet. Languages: en.
Please log in to comment.