cpe:/a:scott_wheeler:taglib:1.0 cpe:/a:scott_wheeler:taglib:1.1 cpe:/a:scott_wheeler:taglib:1.2 cpe:/a:scott_wheeler:taglib:1.3 cpe:/a:scott_wheeler:taglib:1.3.1 cpe:/a:scott_wheeler:taglib:1.4 cpe:/a:scott_wheeler:taglib:1.5 cpe:/a:scott_wheeler:taglib:1.6 cpe:/a:scott_wheeler:taglib:1.6.1 cpe:/a:scott_wheeler:taglib:1.6.2 cpe:/a:scott_wheeler:taglib:1.6.3 cpe:/a:scott_wheeler:taglib:1.7 CVE-2012-1584 2012-09-06T14:55:01.207-04:00 2017-08-28T21:31:19.413-04:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2012-09-07T09:13:00.000-04:00 SECUNIA 48211 SECUNIA 48792 SECUNIA 49688 BID 52290 GENTOO GLSA-201206-16 MLIST [oss-security] 20120305 Re: CVE-Request taglib vulnerabilities MLIST [oss-security] 20120321 Re: CVE-Request taglib vulnerabilities MLIST [oss-security] 20120326 Re: CVE-Request taglib vulnerabilities MLIST [pipermail] 20120304 multiple security vulnerabilities in taglib MLIST [pipermail] 20120305 multiple security vulnerabilities in taglib CONFIRM https://github.com/taglib/taglib/commit/dcdf4fd954e3213c355746fa15b7480461972308 XF taglib-mid-dos(78909) Integer overflow in the mid function in toolkit/tbytevector.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted file header field in a media file, which triggers a large memory allocation.