libcdio: User-assisted execution of arbitrary code
Gentoo Linux Security Advisory
||GLSA 200801-08 / libcdio
||January 20, 2008
||January 20, 2008: 01
All supported architectures
A buffer overflow vulnerability has been discovered in libcdio.
libcdio is a library for accessing CD-ROM and CD images.
Devon Miller reported a boundary error in the "print_iso9660_recurse()"
function in files cd-info.c and iso-info.c when processing long
filenames within Joliet images.
A remote attacker could entice a user to open a specially crafted ISO
image in the cd-info and iso-info applications, resulting in the
execution of arbitrary code with the privileges of the user running the
application. Applications linking against shared libraries of libcdio
are not affected.
There is no known workaround at this time.
All libcdio users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libcdio-0.78.2-r4"