Mumble: Multiple vulnerabilities — GLSA 201406-06

Multiple vulnerabilities have been found in Mumble, the worst of which could lead to arbitrary code execution.

Affected packages

media-sound/mumble on all architectures
Affected versions < 1.2.6
Unaffected versions >= 1.2.6

Background

Mumble is low-latency voice chat software intended for use with gaming.

Description

Multiple vulnerabilities have been discovered in Mumble:

  • A crafted length prefix value can trigger a heap-based buffer overflow or NULL pointer dereference in the opus_packet_get_samples_per_frame function (CVE-2014-0044)
  • A crafted packet can trigger an error in the opus_decode_float function, leading to a heap-based buffer overflow (CVE-2014-0045)
  • A crafted SVG referencing local files can lead to resource exhaustion or hangs (CVE-2014-3755)
  • Mumble does not properly escape HTML in some external strings before displaying them (CVE-2014-3756)

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Mumble users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-sound/mumble-1.2.6"
 

References

Release date
June 06, 2014

Latest revision
June 06, 2014: 1

Severity
high

Exploitable
remote

Bugzilla entries