{"id":"CVE-2014-0045","details":"The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write.","modified":"2026-02-04T03:43:37.006272Z","published":"2014-02-08T00:55:06Z","related":["openSUSE-SU-2024:10080-1"],"references":[{"type":"ADVISORY","url":"http://mumble.info/security/Mumble-SA-2014-004.txt"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2854"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2014-02/msg00063.html"},{"type":"WEB","url":"http://mumble.info/security/Mumble-SA-2014-002.txt"},{"type":"WEB","url":"http://osvdb.org/102905"},{"type":"WEB","url":"http://osvdb.org/102958"},{"type":"WEB","url":"http://www.securityfocus.com/bid/65374"}],"schema_version":"1.7.3"}