[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#432008: flac123: CVE-2007-3507: stack-based buffer overflow



Package: flac123
Version: 0.0.9-5
Severity: grave
Tags: security patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2007-3507 [0]:

"Stack-based buffer overflow in the local__vcentry_parse_value function
in vorbiscomment.c in flac123 (aka flac-tools or flac) before 0.0.10
allows user-assisted remote attackers to execute arbitrary code via a
large comment value_length."

This vulnerability introduces a security hole allowing access to the
accounts of users who use the package.  The original advisory is
available [1], but this has been fixed upstream as the only change in
0.0.10.  I've attached a drop-in dpatch I created from the diff between
0.0.9 and 0.0.10; the patch applies and the package builds fine, but I
have not done further testing.

Please mention the CVE in your changelog.

Thanks,

Alec

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3507
[1] http://www.isecpartners.com/advisories/2007-002-flactools.txt


- -- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.18-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGjmyhAud/2YgchcQRAkMzAJ97PKB93lfQfIEx7syd3zKKa1zf+ACcDHiQ
lh7IDIl6dYrBxA4H67WEoM0=
=SM9U
-----END PGP SIGNATURE-----

Attachment: CVE-2007-3507.dpatch
Description: application/shellscript


Reply to: