Executive Summary
Summary | |
---|---|
Title | libvorbis vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-498-1 | First vendor Publication | 2007-08-16 |
Vendor | Ubuntu | Last vendor Modification | 2007-08-16 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 Ubuntu 7.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: Ubuntu 6.10: Ubuntu 7.04: In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: David Thiel discovered that libvorbis did not correctly verify the size of certain headers, and did not correctly clean up a broken stream. If a user were tricked into processing a specially crafted Vorbis stream, a remote attacker could execute arbitrary code with the user's privileges. |
Original Source
Url : http://www.ubuntu.com/usn/USN-498-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10570 | |||
Oval ID: | oval:org.mitre.oval:def:10570 | ||
Title: | libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c. | ||
Description: | libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-4029 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11449 | |||
Oval ID: | oval:org.mitre.oval:def:11449 | ||
Title: | lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c. NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors. | ||
Description: | lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c. NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-3106 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2009-10-13 | Name : SLES10: Security update for libvorbis File : nvt/sles10_libvorbis0.nasl |
2009-10-10 | Name : SLES9: Security update for libvorbis File : nvt/sles9p5020539.nasl |
2009-04-09 | Name : Mandriva Update for libvorbis MDKSA-2007:167 (libvorbis) File : nvt/gb_mandriva_MDKSA_2007_167.nasl |
2009-03-23 | Name : Ubuntu Update for libvorbis vulnerabilities USN-498-1 File : nvt/gb_ubuntu_USN_498_1.nasl |
2009-02-27 | Name : Fedora Update for libvorbis FEDORA-2007-1765 File : nvt/gb_fedora_2007_1765_libvorbis_fc7.nasl |
2009-02-27 | Name : Fedora Update for libvorbis FEDORA-2007-677 File : nvt/gb_fedora_2007_677_libvorbis_fc6.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200710-03 (libvorbis) File : nvt/glsa_200710_03.nasl |
2008-09-04 | Name : FreeBSD Ports: libvorbis File : nvt/freebsd_libvorbis.nasl |
2008-01-31 | Name : Debian Security Advisory DSA 1471-1 (libvorbis) File : nvt/deb_1471_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
38679 | libvorbis lib/info.c Invalid Blocksize Handling Arbitrary Code Execution |
38678 | libvorbis block.c read Function Invalid Blocksize Handling DoS |
38677 | libvorbis info.c vorbis_info_clear Function Invalid Mapping Type DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0845.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20070919_libvorbis_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11932.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-167.nasl - Type : ACT_GATHER_INFO |
2008-01-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1471.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libvorbis-3849.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libvorbis-4584.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-498-1.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-1765.nasl - Type : ACT_GATHER_INFO |
2007-11-01 | Name : The remote openSUSE host is missing a security update. File : suse_libvorbis-4583.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_libvorbis-3850.nasl - Type : ACT_GATHER_INFO |
2007-10-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0912.nasl - Type : ACT_GATHER_INFO |
2007-10-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200710-03.nasl - Type : ACT_GATHER_INFO |
2007-09-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0845.nasl - Type : ACT_GATHER_INFO |
2007-09-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0845.nasl - Type : ACT_GATHER_INFO |
2007-07-27 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_b73335a53bbe11dc8e830016179b2dd5.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:04:32 |
|