From 6e69c5aa160bcd7715c22e28d833ba88165e62fd Mon Sep 17 00:00:00 2001
From: Martin Wilke <miwi@FreeBSD.org>
Date: Fri, 29 Jun 2007 09:24:06 +0000
Subject: - Document flac123 - stack overflow in comment parsing

Reviewed by:	simon@
---
 security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++
 1 file changed, 27 insertions(+)

diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 579e3dbff164..1d8b3d81aae0 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,33 @@ Note:  Please add new entries to the beginning of this file.
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="32d38cbb-2632-11dc-94da-0016179b2dd5">
+    <topic>flac123 -- stack overflow in comment parsing </topic>
+    <affects>
+      <package>
+	<name>flac123</name>
+	<range><lt>0.9.10</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>isecpartners reports:</p>
+	<blockquote cite="http://www.isecpartners.com/advisories/2007-002-flactools.txt">
+	  <p>flac123, also known as flac-tools, is vulnerable
+	    to a buffer overflow in vorbis comment parsing.
+	    This allows for the execution of arbitrary code.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://www.isecpartners.com/advisories/2007-002-flactools.txt</url>
+    </references>
+    <dates>
+      <discovery>2007-06-05</discovery>
+      <entry>2007-06-28</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="6e099997-25d8-11dc-878b-000c29c5647f">
     <topic>gd -- multiple vulnerabilities</topic>
     <affects>
-- 
cgit debian/1.2.3+git2.25.1-1-2-gaceb0