SB2012062218 - Gentoo update for TagLib 



SB2012062218 - Gentoo update for TagLib

Published: June 22, 2012 Updated: September 25, 2016

Security Bulletin ID SB2012062218
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2012-1107)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The analyzeCurrent function in ape/apeproperties.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted sampleRate in an ape file, which triggers a divide-by-zero error.


2) Input validation error (CVE-ID: CVE-2012-1108)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.


3) Input validation error (CVE-ID: CVE-2012-1584)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Integer overflow in the mid function in toolkit/tbytevector.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted file header field in a media file, which triggers a large memory allocation.


Remediation

Install update from vendor's website.