CVE-2009-0135
Published: 16 January 2009
Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
Priority
Status
Package | Release | Status |
---|---|---|
amarok Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(code not present)
|
gutsy |
Released
(2:1.4.7-0ubuntu3.2)
|
|
hardy |
Released
(2:1.4.9.1-0ubuntu3.2)
|
|
intrepid |
Released
(2:1.4.10-0ubuntu3.1)
|
|
upstream |
Released
(2.0.1.1-1)
|
|
Patches: upstream: http://websvn.kde.org/?view=rev&revision=908391 upstream: http://websvn.kde.org/?view=rev&revision=908401 upstream: http://websvn.kde.org/?view=rev&revision=908415 vendor: http://patch-tracking.debian.net/patch/series/view/amarok/1.4.10-3/20_security_audible_tags.diff |