[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1814-1 libsndfile -- heap-based buffer overflow

ID: oval:org.secpod.oval:def:600295Date: (C)2011-05-13   (M)2022-10-10
Class: PATCHFamily: unix




Two vulnerabilities have been found in libsndfile, a library to read and write sampled audio data. The Common Vulnerabilities and Exposures project identified the following problems: Tobias Klein discovered that the VOC parsing routines suffer of a heap-based buffer overflow which can be triggered by an attacker via a crafted VOC header . The vendor discovered that the AIFF parsing routines suffer of a heap-based buffer overflow similar to CVE-2009-1788 which can be triggered by an attacker via a crafted AIFF header . In both cases the overflowing data is not completely attacker controlled but still leads to application crashes or under some circumstances might still lead to arbitrary code execution. For the oldstable distribution , this problem has been fixed in version 1.0.16-2+etch2. For the stable distribution , this problem has been fixed in version 1.0.17-4+lenny2. For the testing distribution , this problem will be fixed soon. For the unstable distribution , this problem has been fixed in version 1.0.20-1. We recommend that you upgrade your libsndfile packages.

Platform:
Debian 5.0
Debian 4.0
Product:
libsndfile
Reference:
DSA-1814-1
CVE-2009-1788
CVE-2009-1791
CVE    2
CVE-2009-1791
CVE-2009-1788
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies