blob: b7aa98b62f6b18cc7897bff51fcad6abc6e1372f [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200709-06">
<title>flac123: Buffer overflow</title>
flac123 is affected by a buffer overflow vulnerability, which could allow
for the execution of arbitrary code.
<product type="ebuild">flac123</product>
<announced>September 14, 2007</announced>
<revised>September 14, 2007: 01</revised>
<package name="media-sound/flac123" auto="yes" arch="*">
<unaffected range="ge">0.0.11</unaffected>
<vulnerable range="lt">0.0.11</vulnerable>
flac123 is a command-line application for playing FLAC audio files.
A possible buffer overflow vulnerability has been reported in the
local__vcentry_parse_value() function in vorbiscomment.c.
<impact type="normal">
An attacker could entice a user to play a specially crafted audio file,
which could lead to the execution of arbitrary code with the privileges
of the user running the application.
There is no known workaround at this time.
All flac123 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-sound/flac123-0.0.11&quot;</code>
<uri link="">CVE-2007-3507</uri>
<metadata tag="requester" timestamp="Wed, 29 Aug 2007 10:21:26 +0000">
<metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 11:36:53 +0000">
<metadata tag="submitter" timestamp="Tue, 11 Sep 2007 15:39:45 +0000">