Audacious Plugins: User-assisted execution of arbitrary code — GLSA 201203-14

Multiple vulnerabilities in Audacious Plugins could result in execution of arbitrary code or Denial of Service.

Affected packages

media-plugins/audacious-plugins on all architectures
Affected versions < 3.1
Unaffected versions >= 3.1

Background

Plugins for the Audacious music player.

Description

Multiple vulnerabilities have been found in Audacious Plugins:

  • The "CSoundFile::ReadWav()" function in load_wav.cpp contains an integer overflow which could cause a heap-based buffer overflow (CVE-2011-2911).
  • The "CSoundFile::ReadS3M()" function in load_s3m.cpp contains multiple boundary errors which could cause a stack-based buffer overflow (CVE-2011-2912).
  • The "CSoundFile::ReadAMS()" function in load_ams.cpp contains an off-by-one error which could cause memory corruption (CVE-2011-2913).
  • The "CSoundFile::ReadDSM()" function in load_dms.cpp contains an off-by-one error which could cause memory corruption (CVE-2011-2914).
  • The "CSoundFile::ReadAMS2()" function in load_ams.cpp contains an off-by-one error which could cause memory corruption (CVE-2011-2915).

Impact

A remote attacker could entice a user to open a specially crafted media file, possibly resulting in execution of arbitrary code, or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Audacious Plugins users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=media-plugins/audacious-plugins-3.1"
 

References

Release date
March 16, 2012

Latest revision
March 16, 2012: 1

Severity
normal

Exploitable
remote

Bugzilla entries