Joined: 12 May 2004
|Posted: Sun Oct 07, 2007 9:26 pm Post subject: [ GLSA 200710-04 ] libsndfile: Buffer overflow
|Gentoo Linux Security Advisory
Title: libsndfile: Buffer overflow (GLSA 200710-04)
Date: October 07, 2007
A buffer overflow vulnerability has been discovered in libsndfile.
libsndfile is a library for reading and writing various formats of audio files including WAV and FLAC.
Vulnerable: < 1.0.17-r1
Unaffected: >= 1.0.17-r1
Architectures: All supported architectures
Robert Buchholz of the Gentoo Security team discovered that the flac_buffer_copy() function does not correctly handle FLAC streams with variable block sizes which leads to a heap-based buffer overflow (CVE-2007-4974).
A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted FLAC file or network stream with an application using libsndfile. This might lead to the execution of arbitrary code with privileges of the user playing the file.
There is no known workaround at this time.
All libsndfile users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.17-r1"