GLSA Advocate

Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Mar 17, 2009 9:26 pm Post subject: [ GLSA 200903-31 ] libcdaudio: User-assisted execution of ar |
|
|
Gentoo Linux Security Advisory
Title: libcdaudio: User-assisted execution of arbitrary code (GLSA 200903-31)
Severity: normal
Exploitable: remote
Date: March 17, 2009
Bug(s): #245649
ID: 200903-31
Synopsis
A vulnerability in libcdaudio might allow for the remote execution of arbitrary code.
Background
libcdaudio is a library of CD audio related routines.
Affected Packages
Package: media-libs/libcdaudio
Vulnerable: < 0.99.12-r1
Unaffected: >= 0.99.12-r1
Architectures: All supported architectures
Description
A heap-based buffer overflow has been reported in the cddb_read_disc_data() function in cddb.c when processing overly long CDDB data.
Impact
A remote attacker could entice a user to connect to a malicious CDDB server, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All libcdaudio users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libcdaudio-0.99.12-r1" |
References
CVE-2008-5030 |
|