Joined: 12 May 2004
|Posted: Sun Jan 20, 2008 2:26 am Post subject: [ GLSA 200801-08 ] libcdio: User-assisted execution of arbit
|Gentoo Linux Security Advisory
Title: libcdio: User-assisted execution of arbitrary code (GLSA 200801-08)
Date: January 20, 2008
A buffer overflow vulnerability has been discovered in libcdio.
libcdio is a library for accessing CD-ROM and CD images.
Vulnerable: < 0.78.2-r4
Unaffected: >= 0.78.2-r4
Architectures: All supported architectures
Devon Miller reported a boundary error in the "print_iso9660_recurse()"
function in files cd-info.c and iso-info.c when processing long
filenames within Joliet images.
A remote attacker could entice a user to open a specially crafted ISO
image in the cd-info and iso-info applications, resulting in the
execution of arbitrary code with the privileges of the user running the
application. Applications linking against shared libraries of libcdio
are not affected.
There is no known workaround at this time.
All libcdio users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libcdio-0.78.2-r4"
Last edited by GLSA on Thu Jun 12, 2014 4:26 am; edited 4 times in total