Clementine Music Player through 1.3.1 (when a GLib 2.0.0 DLL is used) is vulnerable to a Read Access Violation on Block Data Move, affecting the MP3 file parsing functionality at memcpy+0x265. The vulnerability is triggered when the user opens a crafted MP3 file or loads a remote stream URL that is mishandled by Clementine. Attackers could exploit this issue to cause a crash (DoS) of the clementine.exe process or achieve arbitrary code execution in the context of the current logged-in Windows user.
References
Link | Resource |
---|---|
https://voidsec.com/advisories/cve-2021-40827/ | Exploit Third Party Advisory |
https://voidsec.com/advisories/cve-2021-40827/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://voidsec.com/advisories/cve-2021-40827/ - Exploit, Third Party Advisory |
Information
Published : 2021-12-15 07:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40827
Mitre link : CVE-2021-40827
CVE.ORG link : CVE-2021-40827
JSON object : View
Products Affected
microsoft
- windows
clementine-player
- clementine
CWE
CWE-787
Out-of-bounds Write