Gentoo Archives: gentoo-announce

From: Alex Legler <a3li@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200905-09 ] libsndfile: User-assisted execution of arbitrary code
Date: Wed, 27 May 2009 18:39:46
Message-Id: 1243449441.4200.1.camel@localhost
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200905-09
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: libsndfile: User-assisted execution of arbitrary code
9 Date: May 27, 2009
10 Bugs: #269863
11 ID: 200905-09
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple heap-based buffer overflow vulnerabilities in libsndfile might
19 allow remote attackers to execute arbitrary code.
20
21 Background
22 ==========
23
24 libsndfile is a C library for reading and writing files containing
25 sampled sound.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 media-libs/libsndfile < 1.0.20 >= 1.0.20
34
35 Description
36 ===========
37
38 The following vulnerabilities have been found in libsndfile:
39
40 * Tobias Klein reported that the header_read() function in
41 src/common.c uses user input for calculating a buffer size, possibly
42 leading to a heap-based buffer overflow (CVE-2009-1788).
43
44 * The vendor reported a boundary error in the aiff_read_header()
45 function in src/aiff.c, possibly leading to a heap-based buffer
46 overflow (CVE-2009-1791).
47
48 Impact
49 ======
50
51 A remote attacker could entice a user to open a specially crafted AIFF
52 or VOC file in a program using libsndfile, possibly resulting in the
53 execution of arbitrary code with the privileges of the user running the
54 application.
55
56 Workaround
57 ==========
58
59 There is no known workaround at this time.
60
61 Resolution
62 ==========
63
64 All libsndfile users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.20"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2009-1788
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788
74 [ 2 ] CVE-2009-1791
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200905-09.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2009 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature