Lucene search

K
gentooGentoo FoundationGLSA-200806-09
HistoryJun 23, 2008 - 12:00 a.m.

libvorbis: Multiple vulnerabilities

2008-06-2300:00:00
Gentoo Foundation
security.gentoo.org
15

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.042 Low

EPSS

Percentile

92.1%

Background

libvorbis is the reference implementation of the Xiph.org Ogg Vorbis audio file format. It is used by many applications for playback of Ogg Vorbis files.

Description

Will Drewry of the Google Security Team reported multiple vulnerabilities in libvorbis:

  • A zero value for β€œcodebook.dim” is not properly handled, leading to a crash, infinite loop or triggering an integer overflow (CVE-2008-1419).
  • An integer overflow in β€œresidue partition value” evaluation might lead to a heap-based buffer overflow (CVE-2008-1420).
  • An integer overflow in a certain β€œquantvals” and β€œquantlist” calculation might lead to a heap-based buffer overflow (CVE-2008-1423).

Impact

A remote attacker could exploit these vulnerabilities by enticing a user to open a specially crafted Ogg Vorbis file or network stream with an application using libvorbis. This might lead to the execution of arbitrary code with the privileges of the user playing the file or a Denial of Service by a crash or CPU consumption.

Workaround

There is no known workaround at this time.

Resolution

All libvorbis users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.2.1_rc1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/libvorbis<Β 1.2.1_rc1UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.042 Low

EPSS

Percentile

92.1%