The Mem_File_Reader::read_avail function in Data_Reader.cpp in the Game_Music_Emu library (aka game-music-emu) 0.6.1 does not ensure a non-negative size, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Game-music-emu | Game-music-emu_project | 0.6.1 (including) | 0.6.1 (including) |
Game-music-emu | Ubuntu | artful | * |
Game-music-emu | Ubuntu | esm-apps/xenial | * |
Game-music-emu | Ubuntu | trusty | * |
Game-music-emu | Ubuntu | trusty/esm | * |
Game-music-emu | Ubuntu | upstream | * |
Game-music-emu | Ubuntu | xenial | * |
Game-music-emu | Ubuntu | zesty | * |