An insufficient input validation flaw was found in the way libvorbis used to process codec file headers (static mode headers and encoding books) for the Ogg Vorbis audio file format (Ogg). A remote attacker could provide a specially-crafted Ogg file, which would lead to denial of service (memory corruption and application crash) or, potentially execute arbitrary code with the privileges of the application using the libvorbis library, when opened by the victim. References: ----------- https://bugzilla.mozilla.org/show_bug.cgi?id=500254 http://bugs.gentoo.org/280393 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2663 Reproducer: ----------- https://bugzilla.mozilla.org/attachment.cgi?id=384979
Created attachment 356685 [details] Upstream patch Retrieved via command: svn diff -r 16180:16182 http://svn.xiph.org/trunk/vorbis/ > libvorbis-CVE-2009-2663.patch
Created attachment 356686 [details] Downloaded reproducer
This issue affects the versions of the libvorbis package, as shipped with Fedora releases of 10 and 11. Please fix. Note: Please ensure to mention CVE identifier in the libvorbis rpm Changelog, while scheduling Fedora updates.
libvorbis-1.2.0-6.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/libvorbis-1.2.0-6.fc10
libvorbis-1.2.0-8.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/libvorbis-1.2.0-8.fc11
Rawhide/F12 Alpha is unaffected (libvorbis-1.2.3 contains the fix).
libvorbis-1.2.0-6.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
libvorbis-1.2.0-8.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2009:1219 https://rhn.redhat.com/errata/RHSA-2009-1219.html