libvorbis

Page content
  • Author: vmiklos
  • Vulnerable: 1.1.2-1
  • Unaffected: 1.2.0-1terminus1

David Thiel has reported some vulnerabilities in libvorbis, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

  1. A boundary error exists in the way the “_01inverse()” function in res.c processes “blocksize_0” and “blocksize_1” values, which can be exploited to cause a heap overwrite.
  2. A boundary error exists in the way the “vorbis_info_clear()” function in info.c processes invalid mapping types, which can be exploited to trigger a call to a value outside the dispatch table.
  3. Invalid “blocksize” values passed to the “vorbis_dsp_clear()” function in block.c result in an invalid memory access, which can be exploited to cause a DoS.

CVEs: