CVE-2007-6277
Published: 7 December 2007
Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. NOTE: some of these issues may overlap CVE-2007-4619.
Notes
Author | Note |
---|---|
jdstrand | debian DSA is identical except they left out a couple of safe_ calls. This was fixed in Ubuntu's fix for CVE-2007-4619 note that CVE-2007-4619 was very general and came out before the iDefense CVEs, so there is overlap |
Priority
Status
Package | Release | Status |
---|---|---|
flac Launchpad, Ubuntu, Debian |
upstream |
Released
(1.2.1)
|
dapper |
Released
(1.1.2-3ubuntu1.1)
|
|
edgy |
Released
(1.1.2-5ubuntu1.1)
|
|
feisty |
Released
(1.1.2-5ubuntu2.1)
|
|
gutsy |
Released
(1.1.4-3ubuntu1.1)
|
|
hardy |
Not vulnerable
(1.2.1-1)
|
|
Patches: vendor: http://www.debian.org/security/2008/dsa-1469 |