Lucene search

K
gentooGentoo FoundationGLSA-200711-15
HistoryNov 12, 2007 - 12:00 a.m.

FLAC: Buffer overflow

2007-11-1200:00:00
Gentoo Foundation
security.gentoo.org
11

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.516 Medium

EPSS

Percentile

97.6%

Background

The Xiph.org Free Lossless Audio Codec (FLAC) library is the reference implementation of the FLAC audio file format. It contains encoders and decoders in library and executable form.

Description

Sean de Regge reported multiple integer overflows when processing FLAC media files that could lead to improper memory allocations resulting in heap-based buffer overflows.

Impact

A remote attacker could entice a user to open a specially crafted FLAC file or network stream with an application using FLAC. This might lead to the execution of arbitrary code with privileges of the user playing the file.

Workaround

There is no known workaround at this time.

Resolution

All FLAC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/flac-1.2.1-r1"

You should also run revdep-rebuild to rebuild any packages that depend on older versions of FLAC:

 # revdep-rebuild --library=libFLAC.*
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/flac< 1.2.1-r1UNKNOWN

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.516 Medium

EPSS

Percentile

97.6%