Joined: 12 May 2004
|Posted: Wed May 27, 2009 7:26 pm Post subject: [ GLSA 200905-09 ] libsndfile: User-assisted execution of ar
|Gentoo Linux Security Advisory
Title: libsndfile: User-assisted execution of arbitrary code (GLSA 200905-09)
Date: May 27, 2009
Multiple heap-based buffer overflow vulnerabilities in libsndfile might
allow remote attackers to execute arbitrary code.
libsndfile is a C library for reading and writing files containing
Vulnerable: < 1.0.20
Unaffected: >= 1.0.20
Architectures: All supported architectures
The following vulnerabilities have been found in libsndfile:
- Tobias Klein reported that the header_read() function in
src/common.c uses user input for calculating a buffer size, possibly
leading to a heap-based buffer overflow (CVE-2009-1788).
vendor reported a boundary error in the aiff_read_header() function in
src/aiff.c, possibly leading to a heap-based buffer overflow
A remote attacker could entice a user to open a specially crafted AIFF
or VOC file in a program using libsndfile, possibly resulting in the
execution of arbitrary code with the privileges of the user running the
There is no known workaround at this time.
All libsndfile users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.20"
Last edited by GLSA on Thu Dec 10, 2009 4:28 am; edited 2 times in total