Gentoo Logo

Mumble: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201406-06 / mumble
Release Date June 06, 2014
Latest Revision June 06, 2014: 1
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-sound/mumble < 1.2.6 >= 1.2.6 All supported architectures

Related bugreports: #500486, #510380


Multiple vulnerabilities have been found in Mumble, the worst of which could lead to arbitrary code execution.

2.  Impact Information


Mumble is low-latency voice chat software intended for use with gaming.


Multiple vulnerabilities have been discovered in Mumble:

  • A crafted length prefix value can trigger a heap-based buffer overflow or NULL pointer dereference in the opus_packet_get_samples_per_frame function (CVE-2014-0044)
  • A crafted packet can trigger an error in the opus_decode_float function, leading to a heap-based buffer overflow (CVE-2014-0045)
  • A crafted SVG referencing local files can lead to resource exhaustion or hangs (CVE-2014-3755)
  • Mumble does not properly escape HTML in some external strings before displaying them (CVE-2014-3756)


A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

3.  Resolution Information


There is no known workaround at this time.


All Mumble users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-sound/mumble-1.2.6"

4.  References


Page updated June 06, 2014

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.