First published: Fri Jan 16 2009(Updated: )
Multiple array index errors in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via an Audible Audio (.aa) file with a crafted (1) nlen or (2) vlen Tag value, each of which can lead to an invalid pointer dereference, or the writing of a 0x00 byte to an arbitrary memory location, after an allocation failure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gitolite | =1.4.10 | |
Gitolite | =2.0 | |
Gitolite | =2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0136 has a medium severity rating due to its potential to cause application crashes or arbitrary code execution.
To fix CVE-2009-0136, update Amarok to the latest version that addresses this vulnerability.
CVE-2009-0136 affects Amarok versions 1.4.10, 2.0, and 2.0.1.
CVE-2009-0136 is associated with denial of service attacks and the possibility of executing arbitrary code.
Yes, CVE-2009-0136 can be exploited remotely through crafted Audible Audio (.aa) files.