[arch-security] [ASA-201602-9] lib32-libsndfile: multiple issues
Christian Rebischke
Chris.Rebischke at archlinux.org
Sat Feb 6 12:48:16 UTC 2016
Arch Linux Security Advisory ASA-201602-8
=========================================
Severity: Medium
Date : 2016-02-06
CVE-ID : CVE-2014-9496 CVE-2014-9756 CVE-2015-7805
Package : lib32-libsndfile
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package lib32-libsndfile before version 1.0.26-1 is vulnerable to
multiple issues including denial of service and unspecified impact.
Resolution
==========
Upgrade to 1.0.26-1.
# pacman -Syu "lib32-libsndfile>=1.0.26-1"
The problems have been fixed upstream in version 1.0.26.
Workaround
==========
None.
Description
===========
- CVE-2014-9496 (unspecified impact)
The sd2_parse_rsrc_fork function in sd2.c in lib32-libsndfile allows
attackers to have unspecified impact via vectors related to a (1) map offset
or (2) rsrc marker, which triggers an out-of-bounds read.
- CVE-2014-9756 (denial of service)
The psf_fwrite function in file_io.c in lib32-libsndfile allows attackers to
cause a denial of service (divide-by-zero error and application crash) via
unspecified vectors related to the headindex variable.
- CVE-2015-7805 (unspecified impact)
Heap-based buffer overflow in lib32-libsndfile 1.0.25 allows remote
attackers to have unspecified impact via the headindex value in the header
in an AIFF file.
Impact
======
A remote attacker could be able to have unspecified impact on the running
application. Furthermore a local attacker is able to crash the running
application by causing a divide-by-zero error.
References
==========
https://access.redhat.com/security/cve/CVE-2014-9496
https://access.redhat.com/security/cve/CVE-2014-9756
https://access.redhat.com/security/cve/CVE-2015-7805
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160206/f57b2b67/attachment.asc>
More information about the arch-security
mailing list