blob: bd0080496369b2b8d69cce4c5de4c169d7742de0 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200503-18">
<title>Ringtone Tools: Buffer overflow vulnerability</title>
The Ringtone Tools utilities contain a buffer overflow vulnerability,
potentially leading to the execution of arbitrary code.
<product type="ebuild">ringtonetools</product>
<announced>March 15, 2005</announced>
<revised>March 15, 2005: 01</revised>
<package name="app-mobilephone/ringtonetools" auto="yes" arch="*">
<unaffected range="ge">2.23</unaffected>
<vulnerable range="lt">2.23</vulnerable>
Ringtone Tools is a program for creating ringtones and logos for
mobile phones.
Qiao Zhang has discovered a buffer overflow vulnerability in the
'parse_emelody' function in 'parse_emelody.c'.
<impact type="normal">
A remote attacker could entice a Ringtone Tools user to open a
specially crafted eMelody file, which would potentially lead to the
execution of arbitrary code with the rights of the user running the
There is no known workaround at this time.
All Ringtone Tools users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-mobilephone/ringtonetools-2.23&quot;</code>
<uri link="">CAN-2004-1292</uri>
<metadata tag="requester" timestamp="Tue, 15 Mar 2005 02:28:50 +0000">
<metadata tag="bugReady" timestamp="Tue, 15 Mar 2005 09:56:20 +0000">
<metadata tag="submitter" timestamp="Tue, 15 Mar 2005 14:11:25 +0000">