Bug 501053 - libsndfile: Heap-based overflow when parsing specially-crafted VOC file, and AIFF file 'MARK' chunk
Summary: libsndfile: Heap-based overflow when parsing specially-crafted VOC file, and ...
Keywords:
Status: CLOSED DUPLICATE of bug 502657
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://www.mega-nerd.com/libsndfile/C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-05-15 17:38 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:30 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-05-28 10:39:24 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2009-05-15 17:38:46 UTC
A heap-based buffer overflow flaw was found in libsndfile's Creative Voice (VOC) file format decoder. An attacker could create a specially-crafted VOC file,
which would cause an application using libsndfile to crash or, potentially,
execute arbitrary code as the user running the application, when opened by
a victim. 

A heap-based buffer overflow flaw was found in libsndfile's Audio Interchange File Format (AIFF) file format decoder. An attacker could create a malicious
AIFF file (with specially-crafted 'MARK' chunk), which would cause an
application using libsndfile to crash or, potentially, execute arbitrary code
as the user running the application, when opened by a victim.

References:
http://www.mega-nerd.com/libsndfile/ChangeLog
http://www.trapkit.de/advisories/published.html
http://www.trapkit.de/advisories/TKADV2009-006.txt

VOC file format heap-based buffer overflow discovered by: Tobias Klein
AIFF file format heap-based buffer overflow discovered by: Jamie Strandboge

Comment 1 Jan Lieskovsky 2009-05-28 10:39:24 UTC

*** This bug has been marked as a duplicate of bug 502657 ***


Note You need to log in before you can comment on or make changes to this bug.