Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2007-6277

Published: 7 December 2007

Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. NOTE: some of these issues may overlap CVE-2007-4619.

Notes

AuthorNote
jdstrand
debian DSA is identical except they left out a couple of safe_
calls.  This was fixed in Ubuntu's fix for CVE-2007-4619
note that CVE-2007-4619 was very general and came out before the
iDefense CVEs, so there is overlap

Priority

Medium

Status

Package Release Status
flac
Launchpad, Ubuntu, Debian
dapper
Released (1.1.2-3ubuntu1.1)
edgy
Released (1.1.2-5ubuntu1.1)
feisty
Released (1.1.2-5ubuntu2.1)
gutsy
Released (1.1.4-3ubuntu1.1)
upstream
Released (1.2.1)
Patches:
vendor: http://www.debian.org/security/2008/dsa-1469