First published: Thu Jul 26 2007(Updated: )
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libvorbis | <0:1.0rc2-7.el2 | 0:1.0rc2-7.el2 |
redhat/libvorbis | <1:1.0-8.el3 | 1:1.0-8.el3 |
redhat/libvorbis | <1:1.1.0-2.el4.5 | 1:1.1.0-2.el4.5 |
redhat/libvorbis | <1:1.1.2-3.el5.0 | 1:1.1.2-3.el5.0 |
Rpath Rpath Linux | =1 | |
Rpath Rpath Linux | =1.0.1 | |
Rpath Rpath Linux | =1.0.2 | |
Rpath Rpath Linux | =1.0.3 | |
Rpath Rpath Linux | =1.0.4 | |
Rpath Rpath Linux | =1.0.5 | |
Rpath Rpath Linux | =1.0.6 | |
Libvorbis Libvorbis | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.