Executive Summary
Summary | |
---|---|
Title | flac security update |
Informations | |||
---|---|---|---|
Name | RHSA-2015:0767 | First vendor Publication | 2015-03-31 |
Vendor | RedHat | Last vendor Modification | 2015-03-31 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated flac packages that fix two security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The flac packages contain a decoder and an encoder for the FLAC (Free Lossless Audio Codec) audio file format. A buffer overflow flaw was found in the way flac decoded FLAC audio files. An attacker could create a specially crafted FLAC audio file that could cause an application using the flac library to crash or execute arbitrary code when the file was read. (CVE-2014-9028) A buffer over-read flaw was found in the way flac processed certain ID3v2 metadata. An attacker could create a specially crafted FLAC audio file that could cause an application using the flac library to crash when the file was read. (CVE-2014-8962) All flac users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, all applications linked against the flac library must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1167236 - CVE-2014-8962 flac: Buffer read overflow when processing ID3V2 metadata 1167741 - CVE-2014-9028 flac: Heap buffer write overflow in read_residual_partitioned_rice_ |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2015-0767.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28232 | |||
Oval ID: | oval:org.mitre.oval:def:28232 | ||
Title: | DSA-3082-1 -- flac security update | ||
Description: | Michele Spagnuolo, of Google Security Team, and Miroslav Lichvar, of Red Hat, discovered two issues in flac, a library handling Free Lossless Audio Codec media: by providing a specially crafted FLAC file, an attacker could execute arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3082-1 CVE-2014-8962 CVE-2014-9028 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | flac |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28364 | |||
Oval ID: | oval:org.mitre.oval:def:28364 | ||
Title: | USN-2426-1 -- FLAC vulnerabilities | ||
Description: | Michele Spagnuolo discovered that FLAC incorrectly handled certain malformed audio files. An attacker could use this issue to cause FLAC to crash, resulting in a denial of service, or possibly execute arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2426-1 CVE-2014-8962 CVE-2014-9028 | Version: | 5 |
Platform(s): | Ubuntu 14.10 Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | flac |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28479 | |||
Oval ID: | oval:org.mitre.oval:def:28479 | ||
Title: | SUSE-SU-2014:1577-1 -- Security update for flac (low) | ||
Description: | flac was updated to fix two security issues: * Stack overflow may result in arbitrary code execution (CVE-2014-8962). * Heap overflow via specially crafted .flac files (CVE-2014-9028). Security Issues: * CVE-2014-8962 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962> * CVE-2014-9028 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1577-1 CVE-2014-8962 CVE-2014-9028 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | flac |
Definition Synopsis: | |||
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-08-18 | Name : The remote Fedora host is missing a security update. File : fedora_2015-13353.nasl - Type : ACT_GATHER_INFO |
2015-08-18 | Name : The remote Fedora host is missing a security update. File : fedora_2015-13160.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote Fedora host is missing a security update. File : fedora_2015-13145.nasl - Type : ACT_GATHER_INFO |
2015-04-17 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-505.nasl - Type : ACT_GATHER_INFO |
2015-04-03 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-188.nasl - Type : ACT_GATHER_INFO |
2015-04-02 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150401_flac_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2015-04-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0767.nasl - Type : ACT_GATHER_INFO |
2015-04-01 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0767.nasl - Type : ACT_GATHER_INFO |
2015-04-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-0767.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-99.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-40.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16272.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-239.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16270.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16251.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16175.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16148.nasl - Type : ACT_GATHER_INFO |
2014-12-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-756.nasl - Type : ACT_GATHER_INFO |
2014-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16258.nasl - Type : ACT_GATHER_INFO |
2014-12-06 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_flac-141201.nasl - Type : ACT_GATHER_INFO |
2014-12-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3082.nasl - Type : ACT_GATHER_INFO |
2014-11-28 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2426-1.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_a33addf674e611e4a615f8b156b6dcc8.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-12-05 13:27:56 |
|
2015-04-18 13:27:03 |
|
2015-04-07 09:32:41 |
|
2015-04-04 13:27:30 |
|
2015-04-02 13:28:11 |
|
2015-04-01 09:25:14 |
|