First published: Thu Jul 26 2007(Updated: )
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libvorbis | <0:1.0rc2-7.el2 | 0:1.0rc2-7.el2 |
redhat/libvorbis | <1:1.0-8.el3 | 1:1.0-8.el3 |
redhat/libvorbis | <1:1.1.0-2.el4.5 | 1:1.1.0-2.el4.5 |
redhat/libvorbis | <1:1.1.2-3.el5.0 | 1:1.1.2-3.el5.0 |
Rpath Linux | =1 | |
Rpath Linux | =1.0.1 | |
Rpath Linux | =1.0.2 | |
Rpath Linux | =1.0.3 | |
Rpath Linux | =1.0.4 | |
Rpath Linux | =1.0.5 | |
Rpath Linux | =1.0.6 | |
libvorbis | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4029 has been rated as a medium severity vulnerability.
To fix CVE-2007-4029, upgrade to libvorbis version 1.2.0 or later.
CVE-2007-4029 affects libvorbis versions prior to 1.2.0, specifically 1.1.2 and other earlier versions.
CVE-2007-4029 can lead to a denial of service condition due to an out-of-bounds read and segmentation fault.
CVE-2007-4029 is reported in specific versions of the libvorbis package in certain Linux distributions.