A buffer overflow vulnerability has been discovered in libsndfile.
|Package||media-libs/libsndfile on all architectures|
|Affected versions||< 1.0.17-r1|
|Unaffected versions||>= 1.0.17-r1|
libsndfile is a library for reading and writing various formats of audio files including WAV and FLAC.
Robert Buchholz of the Gentoo Security team discovered that the flac_buffer_copy() function does not correctly handle FLAC streams with variable block sizes which leads to a heap-based buffer overflow (CVE-2007-4974).
A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted FLAC file or network stream with an application using libsndfile. This might lead to the execution of arbitrary code with privileges of the user playing the file.
There is no known workaround at this time.
All libsndfile users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.17-r1"
October 07, 2007
October 07, 2007: 01