[arch-security] [ASA-201602-9] lib32-libsndfile: multiple issues

Christian Rebischke Chris.Rebischke at archlinux.org
Sat Feb 6 12:48:16 UTC 2016


Arch Linux Security Advisory ASA-201602-8
=========================================

Severity: Medium
Date    : 2016-02-06
CVE-ID  : CVE-2014-9496 CVE-2014-9756 CVE-2015-7805
Package : lib32-libsndfile
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package lib32-libsndfile before version 1.0.26-1 is vulnerable to
multiple issues including denial of service and unspecified impact. 

Resolution
==========

Upgrade to 1.0.26-1.

# pacman -Syu "lib32-libsndfile>=1.0.26-1"

The problems have been fixed upstream in version 1.0.26.

Workaround
==========

None.

Description
===========

- CVE-2014-9496 (unspecified impact) 
The sd2_parse_rsrc_fork function in sd2.c in lib32-libsndfile allows
attackers to have unspecified impact via vectors related to a (1) map offset
or (2) rsrc marker, which triggers an out-of-bounds read.

- CVE-2014-9756 (denial of service) 
The psf_fwrite function in file_io.c in lib32-libsndfile allows attackers to
cause a denial of service (divide-by-zero error and application crash) via
unspecified vectors related to the headindex variable.

- CVE-2015-7805 (unspecified impact) 
Heap-based buffer overflow in lib32-libsndfile 1.0.25 allows remote
attackers to have unspecified impact via the headindex value in the header
in an AIFF file.

Impact
======

A remote attacker could be able to have unspecified impact on the running
application. Furthermore a local attacker is able to crash the running
application by causing a divide-by-zero error.

References
==========

https://access.redhat.com/security/cve/CVE-2014-9496
https://access.redhat.com/security/cve/CVE-2014-9756
https://access.redhat.com/security/cve/CVE-2015-7805
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160206/f57b2b67/attachment.asc>


More information about the arch-security mailing list