Lucene search

K
gentooGentoo FoundationGLSA-200709-06
HistorySep 14, 2007 - 12:00 a.m.

flac123: Buffer overflow

2007-09-1400:00:00
Gentoo Foundation
security.gentoo.org
17

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.171 Low

EPSS

Percentile

96.1%

Background

flac123 is a command-line application for playing FLAC audio files.

Description

A possible buffer overflow vulnerability has been reported in the local__vcentry_parse_value() function in vorbiscomment.c.

Impact

An attacker could entice a user to play a specially crafted audio file, which could lead to the execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All flac123 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-sound/flac123-0.0.11"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-sound/flac123< 0.0.11UNKNOWN

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.171 Low

EPSS

Percentile

96.1%