First published: Fri Apr 04 2008(Updated: )
Will Drewry of the Google Security Team reported an issue in OGG Vorbis library, that can cause crash of the application using vorbis library, trigger an infinite loop, or cause an integer overflow leading to possible heap overflow. Problem is caused by codebooks with codebook.dim == 0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Linux Advanced Workstation | =2.1 | |
libvorbisfile | =1.0.0 | |
libvorbisfile | =1.0.1 | |
libvorbisfile | =1.1.0 | |
libvorbisfile | =1.1.1 | |
libvorbisfile | =1.2.0 | |
libvorbisfile | =1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1419 is classified as a medium to high severity vulnerability due to potential application crashes and security risks associated with the integer overflow.
To fix CVE-2008-1419, update the libvorbis library to a patched version that addresses the vulnerability.
CVE-2008-1419 affects specific versions of the libvorbis library, including versions 1.0.0 to 1.12.
CVE-2008-1419 is caused by handling codebooks with the dimension set to zero, leading to an infinite loop or integer overflow.
Yes, CVE-2008-1419 can be exploited remotely, which makes it important to apply the necessary patches.