First published: Thu May 18 2006(Updated: )
Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/extractor | =0.5 | |
libextractor | =0.5.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2458 has been classified as a critical vulnerability due to its ability to allow remote code execution.
To fix CVE-2006-2458, upgrade to Libextractor version 0.5.14 or later, which addresses the identified buffer overflow issues.
CVE-2006-2458 affects Libextractor version 0.5.13 and earlier, as well as the extractor package version 0.5.
Attackers can exploit CVE-2006-2458 through specially crafted ASF or QT files that trigger the buffer overflows.
Users and systems utilizing Libextractor versions 0.5.13 or earlier are at risk of exploitation from this vulnerability.