Lucene search

K
gentooGentoo FoundationGLSA-200903-31
HistoryMar 17, 2009 - 12:00 a.m.

libcdaudio: User-assisted execution of arbitrary code

2009-03-1700:00:00
Gentoo Foundation
security.gentoo.org
8

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.02

Percentile

88.9%

Background

libcdaudio is a library of CD audio related routines.

Description

A heap-based buffer overflow has been reported in the cddb_read_disc_data() function in cddb.c when processing overly long CDDB data.

Impact

A remote attacker could entice a user to connect to a malicious CDDB server, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All libcdaudio users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/libcdaudio-0.99.12-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/libcdaudio<Β 0.99.12-r1UNKNOWN

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.02

Percentile

88.9%