libsndfile: User-assisted execution of arbitrary code
Gentoo Linux Security Advisory
||GLSA 200905-09 / libsndfile
||May 27, 2009
||May 27, 2009: 01
All supported architectures
Multiple heap-based buffer overflow vulnerabilities in libsndfile might
allow remote attackers to execute arbitrary code.
libsndfile is a C library for reading and writing files containing
The following vulnerabilities have been found in libsndfile:
- Tobias Klein reported that the header_read() function in
src/common.c uses user input for calculating a buffer size, possibly
leading to a heap-based buffer overflow (CVE-2009-1788).
vendor reported a boundary error in the aiff_read_header() function in
src/aiff.c, possibly leading to a heap-based buffer overflow
A remote attacker could entice a user to open a specially crafted AIFF
or VOC file in a program using libsndfile, possibly resulting in the
execution of arbitrary code with the privileges of the user running the
There is no known workaround at this time.
All libsndfile users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.20"