First published: Wed Jun 27 2007(Updated: )
Chris Montgomery has informed us of a bug found in libvorbis. The patch is in revision 13160 from <a href="http://svn.xiph.org/trunk/vorbis">http://svn.xiph.org/trunk/vorbis</a> (svn diff -r 13159:13160 <a href="http://svn.xiph.org/trunk/vorbis">http://svn.xiph.org/trunk/vorbis</a>) I'm calling this bug an "array boundary condition flaw". It's the best definition I could find that matched up with something MITRE uses. The issue in question is related to the usage of a function pointer table. Here is an example: _mapping_P[ci->map_type[i]]->free_info(ci->map_param[i]); What happens is the value of 'ci->map_type[i]' can be an attacker controlled 16 bit unsigned integer. The amount of play with the that function pointer is a bit suspect I admit, but I suspect it's still exploitable (some peer review from someone better at this sort of thing would be helpful). The code in question is called when libvorbis starts to clean things up after receiving bad data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rpath Linux | =1 | |
Rpath Linux | =1.0.1 | |
Rpath Linux | =1.0.2 | |
Rpath Linux | =1.0.3 | |
Rpath Linux | =1.0.4 | |
Rpath Linux | =1.0.5 | |
Rpath Linux | =1.0.6 | |
libvorbis | <=1.2.0 | |
libvorbis | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3106 is a moderate severity vulnerability that affects certain versions of libvorbis.
To fix CVE-2007-3106, users should update to the latest version of libvorbis that contains the patch for this vulnerability.
CVE-2007-3106 affects libvorbis versions up to and including 1.1.2.
Yes, Rpath Linux versions from 1.0 to 1.0.6 are reported as not vulnerable to CVE-2007-3106.
CVE-2007-3106 involves a bug in libvorbis that could lead to security issues if exploited.