CVE-2009-1788

Heap-based buffer overflow in voc_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a VOC file with an invalid header value.
References
Link Resource
http://secunia.com/advisories/35076 Vendor Advisory
http://secunia.com/advisories/35126
http://secunia.com/advisories/35247
http://secunia.com/advisories/35443
http://security.gentoo.org/glsa/glsa-200905-09.xml
http://trapkit.de/advisories/TKADV2009-006.txt Exploit
http://www.debian.org/security/2009/dsa-1814
http://www.mandriva.com/security/advisories?name=MDVSA-2009:132
http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/ Patch Vendor Advisory
http://www.mega-nerd.com/libsndfile/ Patch
http://www.securityfocus.com/bid/34978 Patch
http://www.vupen.com/english/advisories/2009/1324 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1348 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/50541
https://exchange.xforce.ibmcloud.com/vulnerabilities/50827
http://secunia.com/advisories/35076 Vendor Advisory
http://secunia.com/advisories/35126
http://secunia.com/advisories/35247
http://secunia.com/advisories/35443
http://security.gentoo.org/glsa/glsa-200905-09.xml
http://trapkit.de/advisories/TKADV2009-006.txt Exploit
http://www.debian.org/security/2009/dsa-1814
http://www.mandriva.com/security/advisories?name=MDVSA-2009:132
http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/ Patch Vendor Advisory
http://www.mega-nerd.com/libsndfile/ Patch
http://www.securityfocus.com/bid/34978 Patch
http://www.vupen.com/english/advisories/2009/1324 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1348 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/50541
https://exchange.xforce.ibmcloud.com/vulnerabilities/50827
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mega-nerd:libsndfile:1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:mega-nerd:libsndfile:1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.55:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.552:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://secunia.com/advisories/35076 - Vendor Advisory () http://secunia.com/advisories/35076 - Vendor Advisory
References () http://secunia.com/advisories/35126 - () http://secunia.com/advisories/35126 -
References () http://secunia.com/advisories/35247 - () http://secunia.com/advisories/35247 -
References () http://secunia.com/advisories/35443 - () http://secunia.com/advisories/35443 -
References () http://security.gentoo.org/glsa/glsa-200905-09.xml - () http://security.gentoo.org/glsa/glsa-200905-09.xml -
References () http://trapkit.de/advisories/TKADV2009-006.txt - Exploit () http://trapkit.de/advisories/TKADV2009-006.txt - Exploit
References () http://www.debian.org/security/2009/dsa-1814 - () http://www.debian.org/security/2009/dsa-1814 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:132 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:132 -
References () http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/ - Patch, Vendor Advisory () http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/ - Patch, Vendor Advisory
References () http://www.mega-nerd.com/libsndfile/ - Patch () http://www.mega-nerd.com/libsndfile/ - Patch
References () http://www.securityfocus.com/bid/34978 - Patch () http://www.securityfocus.com/bid/34978 - Patch
References () http://www.vupen.com/english/advisories/2009/1324 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1324 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1348 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1348 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50541 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50541 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50827 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50827 -

Information

Published : 2009-05-26 16:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1788

Mitre link : CVE-2009-1788

CVE.ORG link : CVE-2009-1788


JSON object : View

Products Affected

mega-nerd

  • libsndfile

nullsoft

  • winamp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer