flac123: Buffer overflow

2007-09-14T00:00:00
ID GLSA-200709-06
Type gentoo
Reporter Gentoo Foundation
Modified 2007-09-14T00:00:00

Description

Background

flac123 is a command-line application for playing FLAC audio files.

Description

A possible buffer overflow vulnerability has been reported in the local__vcentry_parse_value() function in vorbiscomment.c.

Impact

An attacker could entice a user to play a specially crafted audio file, which could lead to the execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All flac123 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-sound/flac123-0.0.11"