Joined: 12 May 2004
|Posted: Tue Aug 08, 2006 10:26 pm Post subject: [ GLSA 200608-14 ] DUMB: Heap buffer overflow
|Gentoo Linux Security Advisory
Title: DUMB: Heap buffer overflow (GLSA 200608-14)
Date: August 08, 2006
A heap-based buffer overflow in DUMB could result in the execution of
DUMB (Dynamic Universal Music Bibliotheque) is an IT, XM, S3M and MOD
Vulnerable: < 0.9.3-r1
Unaffected: >= 0.9.3-r1
Architectures: All supported architectures
Luigi Auriemma found a heap-based buffer overflow in the
it_read_envelope function which reads the envelope values for volume,
pan and pitch of the instruments referenced in a ".it" (Impulse
Tracker) file with a large number of nodes.
By enticing a user to load a malicious ".it" (Impulse Tracker) file, an
attacker may execute arbitrary code with the rights of the user running
the application that uses a vulnerable DUMB library.
There is no known workaround at this time.
All users of DUMB should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/dumb-0.9.3-r1"
Last edited by GLSA on Fri Dec 12, 2014 4:22 am; edited 2 times in total