Multiple vulnerabilities in libvorbis 1.2.0 [CVE-2008-1419, CVE-2008-1420, CVE-2008-1423]
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libvorbis (Debian) |
Fix Released
|
Unknown
|
|||
libvorbis (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
CVE-2008-1419 description:
"Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow."
http://
CVE-2008-1420:
"Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow."
http://
CVE-2008-1423:
"Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow."
Changed in libvorbis: | |
status: | Unknown → Fix Released |
Debian advisory: http:// www.debian. org/security/ 2008/dsa- 1591