Joined: 12 May 2004
|Posted: Sun Jan 20, 2008 2:26 am Post subject: [ GLSA 200801-08 ] libcdio: User-assisted execution of arbit
|Gentoo Linux Security Advisory
Title: libcdio: User-assisted execution of arbitrary code (GLSA 200801-08)
Date: January 20, 2008
A buffer overflow vulnerability has been discovered in libcdio.
libcdio is a library for accessing CD-ROM and CD images.
Vulnerable: < 0.78.2-r4
Unaffected: >= 0.78.2-r4
Architectures: All supported architectures
Devon Miller reported a boundary error in the "print_iso9660_recurse()" function in files cd-info.c and iso-info.c when processing long filenames within Joliet images.
A remote attacker could entice a user to open a specially crafted ISO image in the cd-info and iso-info applications, resulting in the execution of arbitrary code with the privileges of the user running the application. Applications linking against shared libraries of libcdio are not affected.
There is no known workaround at this time.
All libcdio users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libcdio-0.78.2-r4"
Last edited by GLSA on Tue Mar 24, 2009 4:17 am; edited 2 times in total