A Denial of Service vulnerability was found in libid3tag.
Package | media-libs/libid3tag on all architectures |
---|---|
Affected versions | < 0.15.1b-r2 |
Unaffected versions | >= 0.15.1b-r2 |
libid3tag is an ID3 tag manipulation library.
Kentaro Oda reported an infinite loop in the file field.c when parsing an MP3 file with an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0'.
A remote attacker could entice a user to open a specially crafted MP3 file, possibly resulting in a Denial of Service.
There is no known workaround at this time.
All libid3tag users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libid3tag-0.15.1b-r2"
Release date
May 14, 2008
Latest revision
May 14, 2008: 01
Severity
normal
Exploitable
remote
Bugzilla entries