From 6e69c5aa160bcd7715c22e28d833ba88165e62fd Mon Sep 17 00:00:00 2001 From: Martin Wilke <miwi@FreeBSD.org> Date: Fri, 29 Jun 2007 09:24:06 +0000 Subject: - Document flac123 - stack overflow in comment parsing Reviewed by: simon@ --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 579e3dbff164..1d8b3d81aae0 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,33 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="32d38cbb-2632-11dc-94da-0016179b2dd5"> + <topic>flac123 -- stack overflow in comment parsing </topic> + <affects> + <package> + <name>flac123</name> + <range><lt>0.9.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>isecpartners reports:</p> + <blockquote cite="http://www.isecpartners.com/advisories/2007-002-flactools.txt"> + <p>flac123, also known as flac-tools, is vulnerable + to a buffer overflow in vorbis comment parsing. + This allows for the execution of arbitrary code.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.isecpartners.com/advisories/2007-002-flactools.txt</url> + </references> + <dates> + <discovery>2007-06-05</discovery> + <entry>2007-06-28</entry> + </dates> + </vuln> + <vuln vid="6e099997-25d8-11dc-878b-000c29c5647f"> <topic>gd -- multiple vulnerabilities</topic> <affects> -- cgit debian/1.2.3+git2.25.1-1-2-gaceb0