First published: Fri Jan 23 2015(Updated: )
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/opus-tools | 0.1.10-1 0.2-1 | |
debian/vorbis-tools | 1.4.0-11 1.4.2-1 1.4.2-2 | |
Vorbis-tools | =1.4.0 | |
Fedora | =20 | |
Fedora | =21 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9639 is considered a medium severity vulnerability due to its potential for causing denial of service through a crash.
To mitigate CVE-2014-9639, you should update vorbis-tools to a version higher than 1.4.0-11 or apply necessary patches.
CVE-2014-9639 affects vorbis-tools versions 1.4.0 and the specific packages listed for Debian and Fedora.
CVE-2014-9639 allows remote attackers to trigger an integer overflow that may lead to out-of-bounds memory access and a crash.
Currently, the best workaround for CVE-2014-9639 is to avoid processing WAV files with a crafted number of channels until an update is applied.