libsndfile: Buffer overflow — GLSA 200710-04

A buffer overflow vulnerability has been discovered in libsndfile.

Affected packages

media-libs/libsndfile on all architectures
Affected versions < 1.0.17-r1
Unaffected versions >= 1.0.17-r1

Background

libsndfile is a library for reading and writing various formats of audio files including WAV and FLAC.

Description

Robert Buchholz of the Gentoo Security team discovered that the flac_buffer_copy() function does not correctly handle FLAC streams with variable block sizes which leads to a heap-based buffer overflow (CVE-2007-4974).

Impact

A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted FLAC file or network stream with an application using libsndfile. This might lead to the execution of arbitrary code with privileges of the user playing the file.

Workaround

There is no known workaround at this time.

Resolution

All libsndfile users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.17-r1"

References

Release date
October 07, 2007

Latest revision
October 07, 2007: 01

Severity
normal

Exploitable
remote

Bugzilla entries