Vulnerabilites related to light_speed_gaming - mumble
CVE-2014-0044 (GCVE-0-2014-0044)
Vulnerability from cvelistv5
Published
2014-02-08 00:00
Modified
2024-08-06 08:58
Severity ?
CWE
  • n/a
Summary
The opus_packet_get_samples_per_frame function in client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots allows remote attackers to cause a denial of service (crash) via a crafted length prefix value, which triggers a NULL pointer dereference or a heap-based buffer over-read (aka "out-of-bounds array access").
References
http://www.debian.org/security/2014/dsa-2854 vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html vendor-advisory, x_refsource_SUSE
http://osvdb.org/102904 vdb-entry, x_refsource_OSVDB
http://mumble.info/security/Mumble-SA-2014-001.txt x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:58:26.619Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2854",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2854"
          },
          {
            "name": "openSUSE-SU-2014:0271",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
          },
          {
            "name": "102904",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102904"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mumble.info/security/Mumble-SA-2014-001.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The opus_packet_get_samples_per_frame function in client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots allows remote attackers to cause a denial of service (crash) via a crafted length prefix value, which triggers a NULL pointer dereference or a heap-based buffer over-read (aka \"out-of-bounds array access\")."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-24T15:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2854",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2854"
        },
        {
          "name": "openSUSE-SU-2014:0271",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
        },
        {
          "name": "102904",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102904"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mumble.info/security/Mumble-SA-2014-001.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-0044",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The opus_packet_get_samples_per_frame function in client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots allows remote attackers to cause a denial of service (crash) via a crafted length prefix value, which triggers a NULL pointer dereference or a heap-based buffer over-read (aka \"out-of-bounds array access\")."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2854",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2854"
            },
            {
              "name": "openSUSE-SU-2014:0271",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
            },
            {
              "name": "102904",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102904"
            },
            {
              "name": "http://mumble.info/security/Mumble-SA-2014-001.txt",
              "refsource": "CONFIRM",
              "url": "http://mumble.info/security/Mumble-SA-2014-001.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-0044",
    "datePublished": "2014-02-08T00:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T08:58:26.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0045 (GCVE-0-2014-0045)
Vulnerability from cvelistv5
Published
2014-02-08 00:00
Modified
2024-08-06 08:58
Severity ?
CWE
  • n/a
Summary
The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write.
References
http://www.debian.org/security/2014/dsa-2854 vendor-advisory, x_refsource_DEBIAN
http://osvdb.org/102958 vdb-entry, x_refsource_OSVDB
http://mumble.info/security/Mumble-SA-2014-004.txt x_refsource_CONFIRM
http://osvdb.org/102905 vdb-entry, x_refsource_OSVDB
http://mumble.info/security/Mumble-SA-2014-002.txt x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html vendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/65374 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:58:26.621Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2854",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2854"
          },
          {
            "name": "102958",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102958"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mumble.info/security/Mumble-SA-2014-004.txt"
          },
          {
            "name": "102905",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102905"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mumble.info/security/Mumble-SA-2014-002.txt"
          },
          {
            "name": "openSUSE-SU-2014:0271",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
          },
          {
            "name": "65374",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65374"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2854",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2854"
        },
        {
          "name": "102958",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102958"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mumble.info/security/Mumble-SA-2014-004.txt"
        },
        {
          "name": "102905",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102905"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mumble.info/security/Mumble-SA-2014-002.txt"
        },
        {
          "name": "openSUSE-SU-2014:0271",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
        },
        {
          "name": "65374",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65374"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-0045",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2854",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2854"
            },
            {
              "name": "102958",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102958"
            },
            {
              "name": "http://mumble.info/security/Mumble-SA-2014-004.txt",
              "refsource": "CONFIRM",
              "url": "http://mumble.info/security/Mumble-SA-2014-004.txt"
            },
            {
              "name": "102905",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102905"
            },
            {
              "name": "http://mumble.info/security/Mumble-SA-2014-002.txt",
              "refsource": "CONFIRM",
              "url": "http://mumble.info/security/Mumble-SA-2014-002.txt"
            },
            {
              "name": "openSUSE-SU-2014:0271",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
            },
            {
              "name": "65374",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65374"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-0045",
    "datePublished": "2014-02-08T00:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T08:58:26.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1916 (GCVE-0-2014-1916)
Vulnerability from cvelistv5
Published
2014-02-08 00:00
Modified
2024-09-17 03:13
Severity ?
CWE
  • n/a
Summary
The (1) opus_packet_get_nb_frames and (2) opus_packet_get_samples_per_frame functions in the client in MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d and Mumble for iOS 1.1 through 1.2.2 do not properly check the return value of the copyDataBlock method, which allow remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted length prefix value in an Opus voice packet.
References
http://osvdb.org/102957 vdb-entry, x_refsource_OSVDB
http://mumble.info/security/Mumble-SA-2014-003.txt x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.264Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "102957",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102957"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mumble.info/security/Mumble-SA-2014-003.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) opus_packet_get_nb_frames and (2) opus_packet_get_samples_per_frame functions in the client in MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d and Mumble for iOS 1.1 through 1.2.2 do not properly check the return value of the copyDataBlock method, which allow remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted length prefix value in an Opus voice packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-08T00:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "102957",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102957"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mumble.info/security/Mumble-SA-2014-003.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-1916",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) opus_packet_get_nb_frames and (2) opus_packet_get_samples_per_frame functions in the client in MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d and Mumble for iOS 1.1 through 1.2.2 do not properly check the return value of the copyDataBlock method, which allow remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted length prefix value in an Opus voice packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "102957",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102957"
            },
            {
              "name": "http://mumble.info/security/Mumble-SA-2014-003.txt",
              "refsource": "CONFIRM",
              "url": "http://mumble.info/security/Mumble-SA-2014-003.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-1916",
    "datePublished": "2014-02-08T00:00:00Z",
    "dateReserved": "2014-02-07T00:00:00Z",
    "dateUpdated": "2024-09-17T03:13:28.611Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2014-02-08 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
The (1) opus_packet_get_nb_frames and (2) opus_packet_get_samples_per_frame functions in the client in MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d and Mumble for iOS 1.1 through 1.2.2 do not properly check the return value of the copyDataBlock method, which allow remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted length prefix value in an Opus voice packet.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.1:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "E3287491-AE9A-4291-ADAB-1343C0387265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.1:rc1:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "B9C1A613-0F8E-41D7-A6D8-B65B63BBFBEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.1.1:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "CAD18E98-4585-48C3-B61D-7AF514D97CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "1751EC48-0639-4443-8F9B-C47AB9B8F48A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.1:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "0064542D-D994-45D4-8FED-F75D7F313834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.2:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "3B0B1EEE-CA53-4FCA-978F-F6C12D7D820B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumblekit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AEF9B56-E3B3-4840-8655-401F4554926D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) opus_packet_get_nb_frames and (2) opus_packet_get_samples_per_frame functions in the client in MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d and Mumble for iOS 1.1 through 1.2.2 do not properly check the return value of the copyDataBlock method, which allow remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted length prefix value in an Opus voice packet."
    },
    {
      "lang": "es",
      "value": "Las funciones (1) opus_packet_get_nb_frames y (2) opus_packet_get_samples_per_frame en client en MumbleKit anterior a commit fd190328a9b24d37382b269a5674b0c0c7a7e36d y Mumble para iOS 1.1 hasta 1.2.2 no comprueban debidamente el valor de vuelta del m\u00e9todo copyDataBlock, lo que permiten a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda) a trav\u00e9s de un valor de prefijo de una longitud manipulado en un paquete de voz Opus."
    }
  ],
  "id": "CVE-2014-1916",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-08T00:55:06.237",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://mumble.info/security/Mumble-SA-2014-003.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/102957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://mumble.info/security/Mumble-SA-2014-003.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102957"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-08 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.1:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "E3287491-AE9A-4291-ADAB-1343C0387265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.1:rc1:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "B9C1A613-0F8E-41D7-A6D8-B65B63BBFBEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.1.1:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "CAD18E98-4585-48C3-B61D-7AF514D97CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "1751EC48-0639-4443-8F9B-C47AB9B8F48A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.1:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "0064542D-D994-45D4-8FED-F75D7F313834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.2:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "3B0B1EEE-CA53-4FCA-978F-F6C12D7D820B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7CCA7868-52D3-4B78-BEDB-9777868220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58AB2649-41DA-47F6-BFF2-151ABB49720B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C8575927-B679-4C94-8569-E506DFB0FA6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FED56C-128D-4DE9-A411-FDE610F40047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumblekit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AEF9B56-E3B3-4840-8655-401F4554926D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write."
    },
    {
      "lang": "es",
      "value": "El m\u00e9todo needSamples en AudioOutputSpeech.cpp en client en Mumble 1.2.4 y las instant\u00e1neas pre-lanzamiento de 1.2.3, Mumble para iOS 1.1 hasta 1.2.2 y MumbleKit anterior a commit fd190328a9b24d37382b269a5674b0c0c7a7e36d no comprueba el valor de vuelta de la funci\u00f3n opus_decode_float, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete de voz de Opus manipulado, lo que provoca un error en opus_decode_float, una conversi\u00f3n de un n\u00famero entero negativo en un n\u00famero entero sin signo y una sobre-lectura y sobre-escritura de buffer basada en memoria din\u00e1mica."
    }
  ],
  "id": "CVE-2014-0045",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-08T00:55:06.177",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://mumble.info/security/Mumble-SA-2014-002.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://mumble.info/security/Mumble-SA-2014-004.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/102905"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/102958"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2854"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/65374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mumble.info/security/Mumble-SA-2014-002.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://mumble.info/security/Mumble-SA-2014-004.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102905"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/65374"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-08 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
The opus_packet_get_samples_per_frame function in client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots allows remote attackers to cause a denial of service (crash) via a crafted length prefix value, which triggers a NULL pointer dereference or a heap-based buffer over-read (aka "out-of-bounds array access").
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7CCA7868-52D3-4B78-BEDB-9777868220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58AB2649-41DA-47F6-BFF2-151ABB49720B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C8575927-B679-4C94-8569-E506DFB0FA6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:light_speed_gaming:mumble:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FED56C-128D-4DE9-A411-FDE610F40047",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The opus_packet_get_samples_per_frame function in client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots allows remote attackers to cause a denial of service (crash) via a crafted length prefix value, which triggers a NULL pointer dereference or a heap-based buffer over-read (aka \"out-of-bounds array access\")."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n opus_packet_get_samples_per_frame en client en Mumble 1.2.4 y las instant\u00e1neas pre-lanzamiento de 1.2.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un valor de una longitud de prefijo manipulado, lo que provoca  una referencia a puntero nulo o una sobre-lectura de buffer basada en memoria din\u00e1mica (tambi\u00e9n conocido como \"acceso a array fuera de rango\")."
    }
  ],
  "id": "CVE-2014-0044",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-08T00:55:06.160",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://mumble.info/security/Mumble-SA-2014-001.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/102904"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://mumble.info/security/Mumble-SA-2014-001.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102904"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2854"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}