Joined: 12 May 2004
|Posted: Tue Mar 17, 2009 9:26 pm Post subject: [ GLSA 200903-31 ] libcdaudio: User-assisted execution of ar
|Gentoo Linux Security Advisory
Title: libcdaudio: User-assisted execution of arbitrary code (GLSA 200903-31)
Date: March 17, 2009
A vulnerability in libcdaudio might allow for the remote execution of arbitrary code.
libcdaudio is a library of CD audio related routines.
Vulnerable: < 0.99.12-r1
Unaffected: >= 0.99.12-r1
Architectures: All supported architectures
A heap-based buffer overflow has been reported in the cddb_read_disc_data() function in cddb.c when processing overly long CDDB data.
A remote attacker could entice a user to connect to a malicious CDDB server, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All libcdaudio users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libcdaudio-0.99.12-r1"