Win32 Codecs: User-assisted execution of arbitrary code
Gentoo Linux Security Advisory
||GLSA 201312-11 / win32codecs
||December 16, 2013
||December 16, 2013: 1
All supported architectures
A buffer overflow vulnerability in Win32 Codecs can potentially
allow for user-assisted arbitrary code execution.
Win32 Codecs is a set of Windows audio and video playback codecs.
A heap-based buffer overflow exists when handling Shockwave Flash files.
A remote attacker could entice a user to open a specially crafted Flash
file using a package linked against Win32 Codecs, possibly resulting in
execution of arbitrary code with the privileges of the process or a
Denial of Service condition.
There is no known workaround at this time.
Gentoo has discontinued support for Win32 Codecs. We recommend that
users unmerge Win32 Codecs:
Code Listing 3.1: Resolution
# emerge --unmerge "media-libs/win32codecs"