Lucene search

K
osvGoogleOSV:DLA-99-1
HistoryDec 05, 2014 - 12:00 a.m.

flac - security update

2014-12-0500:00:00
Google
osv.dev
6

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.571 Medium

EPSS

Percentile

97.2%

Michele Spagnuolo, of Google Security Team, and Miroslav Lichvar, of
Red Hat, discovered two issues in flac, a library handling Free
Lossless Audio Codec media: by providing a specially crafted FLAC
file, an attacker could execute arbitrary code.

  • CVE-2014-8962
    Heap-based buffer overflow in stream_decoder.c, allowing
    remote attackers to execute arbitrary code via a specially
    crafted .flac file.
  • CVE-2014-9028
    Stack-based buffer overflow in stream_decoder.c, allowing
    remote attackers to execute arbitrary code via a specially
    crafted .flac file.

For Debian 6 Squeeze, these issues have been fixed in flac version 1.2.1-2+deb6u1

CPENameOperatorVersion
flaceq1.2.1-2

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.571 Medium

EPSS

Percentile

97.2%