First published: Sun Jan 11 2009(Updated: )
Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gitolite | =2.0.1 | |
Gitolite | =1.4.10 | |
Gitolite | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0135 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2009-0135, update Amarok to versions later than 2.0.1 where the vulnerability has been addressed.
CVE-2009-0135 affects Amarok versions 1.4.10 through 2.0.1.
CVE-2009-0135 allows remote attackers to execute arbitrary code by exploiting integer overflows.
Exploitation of CVE-2009-0135 requires the presence of a specially crafted Audible Audio (.aa) file with large tag values.