Lucene search

K
gentooGentoo FoundationGLSA-200608-14
HistoryAug 08, 2006 - 12:00 a.m.

DUMB: Heap buffer overflow

2006-08-0800:00:00
Gentoo Foundation
security.gentoo.org
9

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.027 Low

EPSS

Percentile

90.4%

Background

DUMB (Dynamic Universal Music Bibliotheque) is an IT, XM, S3M and MOD player library.

Description

Luigi Auriemma found a heap-based buffer overflow in the it_read_envelope function which reads the envelope values for volume, pan and pitch of the instruments referenced in a “.it” (Impulse Tracker) file with a large number of nodes.

Impact

By enticing a user to load a malicious “.it” (Impulse Tracker) file, an attacker may execute arbitrary code with the rights of the user running the application that uses a vulnerable DUMB library.

Workaround

There is no known workaround at this time.

Resolution

All users of DUMB should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/dumb-0.9.3-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/dumb< 0.9.3-r1UNKNOWN

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.027 Low

EPSS

Percentile

90.4%