Lucene search

K
gentooGentoo FoundationGLSA-200610-09
HistoryOct 22, 2006 - 12:00 a.m.

libmusicbrainz: Multiple buffer overflows

2006-10-2200:00:00
Gentoo Foundation
security.gentoo.org
14

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.214 Low

EPSS

Percentile

96.5%

Background

libmusicbrainz is a client library used to access MusicBrainz music meta data.

Description

Luigi Auriemma reported a possible buffer overflow in the MBHttp::Download function of lib/http.cpp as well as several possible buffer overflows in lib/rdfparse.c.

Impact

A remote attacker could be able to execute arbitrary code or cause Denial of Service by making use of an overly long “Location” header in an HTTP redirect message from a malicious server or a long URL in malicious RDF feeds.

Workaround

There is no known workaround at this time.

Resolution

All libmusicbrainz users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/musicbrainz-2.1.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/musicbrainz< 2.1.4UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.214 Low

EPSS

Percentile

96.5%