A vulnerability has been discovered in id3lib allowing local users to overwrite arbitrary files via a symlink attack.
|Package||media-libs/id3lib on all architectures|
|Affected versions||< 3.8.3-r6|
|Unaffected versions||>= 3.8.3-r6|
id3lib is an open-source, cross-platform software development library for reading, writing, and manipulating ID3v1 and ID3v2 tags.
Nikolaus Schulz discovered that the function RenderV2ToFile() in file src/tag_file.cpp creates temporary files in an insecure manner.
A local attacker could exploit this vulnerability via a symlink attack to overwrite arbitrary files.
There is no known workaround at this time.
All id3lib users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/id3lib-3.8.3-r6"
September 15, 2007
September 15, 2007: 01