CVE-2009-0136
Published: 16 January 2009
Multiple array index errors in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via an Audible Audio (.aa) file with a crafted (1) nlen or (2) vlen Tag value, each of which can lead to an invalid pointer dereference, or the writing of a 0x00 byte to an arbitrary memory location, after an allocation failure.
Priority
Status
Package | Release | Status |
---|---|---|
amarok Launchpad, Ubuntu, Debian |
upstream |
Released
(2.0.1.1-1)
|
dapper |
Not vulnerable
(code not present)
|
|
gutsy |
Released
(2:1.4.7-0ubuntu3.2)
|
|
hardy |
Released
(2:1.4.9.1-0ubuntu3.2)
|
|
intrepid |
Released
(2:1.4.10-0ubuntu3.1)
|
|
Patches: upstream: http://websvn.kde.org/?view=rev&revision=908391 upstream: http://websvn.kde.org/?view=rev&revision=908401 upstream: http://websvn.kde.org/?view=rev&revision=908415 vendor: http://patch-tracking.debian.net/patch/series/view/amarok/1.4.10-3/20_security_audible_tags.diff |