SB2012062218 - Gentoo update for TagLib
Published: June 22, 2012 Updated: September 25, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2012-1107)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The analyzeCurrent function in ape/apeproperties.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted sampleRate in an ape file, which triggers a divide-by-zero error.
2) Input validation error (CVE-ID: CVE-2012-1108)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.
3) Input validation error (CVE-ID: CVE-2012-1584)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Integer overflow in the mid function in toolkit/tbytevector.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted file header field in a media file, which triggers a large memory allocation.
Remediation
Install update from vendor's website.