GLSA-200905-09 : libsndfile: User-assisted execution of arbitrary code
High Nessus Plugin ID 38944
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200905-09 (libsndfile: User-assisted execution of arbitrary code)
The following vulnerabilities have been found in libsndfile:
Tobias Klein reported that the header_read() function in src/common.c uses user input for calculating a buffer size, possibly leading to a heap-based buffer overflow (CVE-2009-1788).
The vendor reported a boundary error in the aiff_read_header() function in src/aiff.c, possibly leading to a heap-based buffer overflow (CVE-2009-1791).
A remote attacker could entice a user to open a specially crafted AIFF or VOC file in a program using libsndfile, possibly resulting in the execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
SolutionAll libsndfile users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=media-libs/libsndfile-1.0.20'