Описание
Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | not-affected | code not present |
| devel | not-affected | 2.0.1.1-0ubuntu5 |
| gutsy | released | 2:1.4.7-0ubuntu3.2 |
| hardy | released | 2:1.4.9.1-0ubuntu3.2 |
| intrepid | released | 2:1.4.10-0ubuntu3.1 |
| upstream | released | 2.0.1.1-1 |
Показывать по
9.3 Critical
CVSS2
Связанные уязвимости
Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
Multiple integer overflows in the Audible::Tag::readTag function in me ...
Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
9.3 Critical
CVSS2