Audacious Plugins: User-assisted execution of arbitrary code
Gentoo Linux Security Advisory
||GLSA 201203-14 / audacious-plugins
||March 16, 2012
||March 16, 2012: 1
All supported architectures
Multiple vulnerabilities in Audacious Plugins could result in
execution of arbitrary code or Denial of Service.
Plugins for the Audacious music player.
Multiple vulnerabilities have been found in Audacious Plugins:
- The "CSoundFile::ReadWav()" function in load_wav.cpp contains an
integer overflow which could cause a heap-based buffer overflow
- The "CSoundFile::ReadS3M()" function in load_s3m.cpp contains
multiple boundary errors which could cause a stack-based buffer
- The "CSoundFile::ReadAMS()" function in load_ams.cpp contains an
off-by-one error which could cause memory corruption (CVE-2011-2913).
- The "CSoundFile::ReadDSM()" function in load_dms.cpp contains an
off-by-one error which could cause memory corruption (CVE-2011-2914).
- The "CSoundFile::ReadAMS2()" function in load_ams.cpp contains an
off-by-one error which could cause memory corruption (CVE-2011-2915).
A remote attacker could entice a user to open a specially crafted media
file, possibly resulting in execution of arbitrary code, or a Denial of
There is no known workaround at this time.
All Audacious Plugins users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose