CVE-2009-0186

Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://secunia.com/advisories/33980 Vendor Advisory
http://secunia.com/advisories/33981 Vendor Advisory
http://secunia.com/advisories/34316
http://secunia.com/advisories/34526
http://secunia.com/advisories/34642
http://secunia.com/advisories/34791
http://secunia.com/secunia_research/2009-7/ Vendor Advisory
http://secunia.com/secunia_research/2009-8/ Vendor Advisory
http://security.gentoo.org/glsa/glsa-200904-16.xml
http://www.debian.org/security/2009/dsa-1742
http://www.mega-nerd.com/libsndfile/NEWS
http://www.securityfocus.com/archive/1/501399/100/0/threaded
http://www.securityfocus.com/archive/1/501413/100/0/threaded
http://www.securityfocus.com/bid/33963
http://www.securitytracker.com/id?1021784
http://www.ubuntu.com/usn/USN-749-1
http://www.vupen.com/english/advisories/2009/0584 Vendor Advisory
http://www.vupen.com/english/advisories/2009/0585 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49038
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://secunia.com/advisories/33980 Vendor Advisory
http://secunia.com/advisories/33981 Vendor Advisory
http://secunia.com/advisories/34316
http://secunia.com/advisories/34526
http://secunia.com/advisories/34642
http://secunia.com/advisories/34791
http://secunia.com/secunia_research/2009-7/ Vendor Advisory
http://secunia.com/secunia_research/2009-8/ Vendor Advisory
http://security.gentoo.org/glsa/glsa-200904-16.xml
http://www.debian.org/security/2009/dsa-1742
http://www.mega-nerd.com/libsndfile/NEWS
http://www.securityfocus.com/archive/1/501399/100/0/threaded
http://www.securityfocus.com/archive/1/501413/100/0/threaded
http://www.securityfocus.com/bid/33963
http://www.securitytracker.com/id?1021784
http://www.ubuntu.com/usn/USN-749-1
http://www.vupen.com/english/advisories/2009/0584 Vendor Advisory
http://www.vupen.com/english/advisories/2009/0585 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49038
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nullsoft:winamp:5.55:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mega-nerd:libsndfile:*:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:0.0.28:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.17:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html -
References () http://secunia.com/advisories/33980 - Vendor Advisory () http://secunia.com/advisories/33980 - Vendor Advisory
References () http://secunia.com/advisories/33981 - Vendor Advisory () http://secunia.com/advisories/33981 - Vendor Advisory
References () http://secunia.com/advisories/34316 - () http://secunia.com/advisories/34316 -
References () http://secunia.com/advisories/34526 - () http://secunia.com/advisories/34526 -
References () http://secunia.com/advisories/34642 - () http://secunia.com/advisories/34642 -
References () http://secunia.com/advisories/34791 - () http://secunia.com/advisories/34791 -
References () http://secunia.com/secunia_research/2009-7/ - Vendor Advisory () http://secunia.com/secunia_research/2009-7/ - Vendor Advisory
References () http://secunia.com/secunia_research/2009-8/ - Vendor Advisory () http://secunia.com/secunia_research/2009-8/ - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200904-16.xml - () http://security.gentoo.org/glsa/glsa-200904-16.xml -
References () http://www.debian.org/security/2009/dsa-1742 - () http://www.debian.org/security/2009/dsa-1742 -
References () http://www.mega-nerd.com/libsndfile/NEWS - () http://www.mega-nerd.com/libsndfile/NEWS -
References () http://www.securityfocus.com/archive/1/501399/100/0/threaded - () http://www.securityfocus.com/archive/1/501399/100/0/threaded -
References () http://www.securityfocus.com/archive/1/501413/100/0/threaded - () http://www.securityfocus.com/archive/1/501413/100/0/threaded -
References () http://www.securityfocus.com/bid/33963 - () http://www.securityfocus.com/bid/33963 -
References () http://www.securitytracker.com/id?1021784 - () http://www.securitytracker.com/id?1021784 -
References () http://www.ubuntu.com/usn/USN-749-1 - () http://www.ubuntu.com/usn/USN-749-1 -
References () http://www.vupen.com/english/advisories/2009/0584 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/0584 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/0585 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/0585 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49038 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49038 -

Information

Published : 2009-03-05 02:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0186

Mitre link : CVE-2009-0186

CVE.ORG link : CVE-2009-0186


JSON object : View

Products Affected

mega-nerd

  • libsndfile

nullsoft

  • winamp
CWE
CWE-189

Numeric Errors