First published: Fri Aug 07 2009(Updated: )
An insufficient input validation flaw was found in the way libvorbis used to process codec file headers (static mode headers and encoding books) for the Ogg Vorbis audio file format (Ogg). A remote attacker could provide a specially-crafted Ogg file, which would lead to denial of service (memory corruption and application crash) or, potentially execute arbitrary code with the privileges of the application using the libvorbis library, when opened by the victim. References: ----------- <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=500254">https://bugzilla.mozilla.org/show_bug.cgi?id=500254</a> <a href="http://bugs.gentoo.org/280393">http://bugs.gentoo.org/280393</a> <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2663">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2663</a> Reproducer: ----------- <a href="https://bugzilla.mozilla.org/attachment.cgi?id=384979">https://bugzilla.mozilla.org/attachment.cgi?id=384979</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvorbisfile |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-516259 has the potential to cause a denial of service through specially crafted Ogg files.
To fix REDHAT-BUG-516259, you should update to the latest version of the libvorbis package provided by your vendor.
The component affected by REDHAT-BUG-516259 is the libvorbis codec used for processing Ogg Vorbis audio files.
The vendor for the software impacted by REDHAT-BUG-516259 is Xiph.org.
REDHAT-BUG-516259 is classified as an insufficient input validation vulnerability.