libvorbis
Page content
- Author: vmiklos
- Vulnerable: 1.1.2-1
- Unaffected: 1.2.0-1terminus1
David Thiel has reported some vulnerabilities in libvorbis, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.
- A boundary error exists in the way the “_01inverse()” function in res.c processes “blocksize_0” and “blocksize_1” values, which can be exploited to cause a heap overwrite.
- A boundary error exists in the way the “vorbis_info_clear()” function in info.c processes invalid mapping types, which can be exploited to trigger a call to a value outside the dispatch table.
- Invalid “blocksize” values passed to the “vorbis_dsp_clear()” function in block.c result in an invalid memory access, which can be exploited to cause a DoS.
- Bug Tracker URL: http://bugs.frugalware.org/task/2293