CVE-2023-47466
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2023-47466 affects TagLib before version 2.0. The vulnerability allows a segmentation violation and application crash during tag writing via a crafted WAV file in which an id3 chunk is the only valid chunk (NVD).

Technical details

The vulnerability occurs when processing WAV files with specially crafted headers where the id3 chunk is the only valid chunk. When attempting to write tags, the existing id3 chunk is removed, leading to a vector::front() call on an empty chunks vector, resulting in a segmentation fault. The vulnerability has been assigned a CVSS v3.1 Base Score of 2.9 LOW with vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L and is classified as a NULL Pointer Dereference (CWE-476) (NVD).

Impact

The vulnerability affects the availability of software systems using the TagLib library. When exploited, it can cause application crashes during tag writing operations. VLC Media player has been confirmed to be affected by this vulnerability (GitHub Issue).

Mitigation and workarounds

The vulnerability has been fixed in TagLib version 2.0. Users should upgrade to this version to mitigate the issue. The fix involves adding a check for empty vectors before calling vector::front() in the updateGlobalSize() function (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management