Description
dr_libs dr_flac.h version 0.13.3 and earlier contain an uncontrolled memory allocation vulnerability in drflac__read_and_decode_metadata() that allows attackers to trigger excessive memory allocation by supplying crafted PICTURE metadata blocks. Attackers can exploit attacker-controlled mimeLength and descriptionLength fields to cause denial of service through memory exhaustion when processing FLAC streams with metadata callbacks.
Published: 2026-03-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via memory exhaustion
Action: Patch Immediately
AI Analysis

Impact

The vulnerability arises from an uncontrolled memory allocation within the drflac__read_and_decode_metadata function when decoding PICTURE metadata blocks of FLAC streams. By supplying extremely large values for the mimeLength and descriptionLength fields, an attacker can force the library to attempt to allocate a massive amount of memory, leading to memory exhaustion and eventually causing an application to crash. This weakness is classified as CWE‑789 and provides only denial of service without exposing data or allowing code execution.

Affected Systems

The flaw is present in dr_libs dr_flac.h version 0.13.3 and every revision preceding it. Any program that includes this library to handle FLAC audio and invokes the default metadata callbacks is affected. Systems that rely on locally stored audio or receive audio over a network are potentially vulnerable until the library is upgraded or the faulty metadata handling is disabled.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate level of severity, while the EPSS score of less than 1% suggests that exploitation is not widespread. The vulnerability is not currently listed in the CISA KEV catalog. An attacker must supply a specially crafted FLAC stream that contains the malformed PICTURE block; the likely attack vector is delivery of a malicious file to the application, which is therefore inferred rather than explicitly stated in the advisory. For applications exposed to untrusted audio input, the potential impact ranges from transient service interruption to complete application failure, but the overall risk is moderated by the low probability of exploitation.

Generated by OpenCVE AI on March 20, 2026 at 20:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update dr_libs to a newer version than 0.13.3
  • If an update is not possible, disable PICTURE metadata callbacks or enforce size limits on mimeLength and descriptionLength fields
  • Reject or sanitize FLAC files containing suspicious metadata blocks

Generated by OpenCVE AI on March 20, 2026 at 20:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description dr_libs version 0.13.3 and earlier contain an uncontrolled memory allocation vulnerability in drflac__read_and_decode_metadata() that allows attackers to trigger excessive memory allocation by supplying crafted PICTURE metadata blocks. Attackers can exploit attacker-controlled mimeLength and descriptionLength fields to cause denial of service through memory exhaustion when processing FLAC streams with metadata callbacks. dr_libs dr_flac.h version 0.13.3 and earlier contain an uncontrolled memory allocation vulnerability in drflac__read_and_decode_metadata() that allows attackers to trigger excessive memory allocation by supplying crafted PICTURE metadata blocks. Attackers can exploit attacker-controlled mimeLength and descriptionLength fields to cause denial of service through memory exhaustion when processing FLAC streams with metadata callbacks.
Title mackron / dr_libs Excessive Memory Allocation in PICTURE Metadata Parsing mackron / dr_libs dr_flac.h Excessive Memory Allocation in PICTURE Metadata Parsing

Thu, 19 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mackron:dr_libs:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Wed, 18 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Mackron
Mackron dr Libs
Vendors & Products Mackron
Mackron dr Libs

Tue, 17 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description dr_libs version 0.13.3 and earlier contain an uncontrolled memory allocation vulnerability in drflac__read_and_decode_metadata() that allows attackers to trigger excessive memory allocation by supplying crafted PICTURE metadata blocks. Attackers can exploit attacker-controlled mimeLength and descriptionLength fields to cause denial of service through memory exhaustion when processing FLAC streams with metadata callbacks.
Title mackron / dr_libs Excessive Memory Allocation in PICTURE Metadata Parsing
Weaknesses CWE-789
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-23T15:31:57.995Z

Reserved: 2026-03-16T18:11:41.757Z

Link: CVE-2026-32836

cve-icon Vulnrichment

Updated: 2026-03-18T14:06:24.523Z

cve-icon NVD

Status : Modified

Published: 2026-03-17T20:16:14.000

Modified: 2026-03-20T18:16:16.123

Link: CVE-2026-32836

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:44Z

Weaknesses