SB2017060218 - Ubuntu update for libsndfile 



SB2017060218 - Ubuntu update for libsndfile

Published: June 2, 2017 Updated: July 13, 2017

Security Bulletin ID SB2017060218
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-7585)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error in the "flac_buffer_copy()" function (flac.c). A remote attacker can send a specially crafted FLAC file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

2) Stack-based buffer overflow (CVE-ID: CVE-2017-7586)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error in the "header_read()" function (common.c) when handling ID3 tags. A remote attacker can send a specially crafted FLAC file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

3) Denial of service (CVE-ID: CVE-2017-7741)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to a write memory access flaw in the flac_buffer_copy function in flac.c. A remote attacker can send a specially crafted FLAC file, trick the victim into opening it, trigger a segmentation violation and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

4) Denial of service (CVE-ID: CVE-2017-7742)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to a read memory access flaw in the flac_buffer_copy function in flac.c. A remote attacker can send a specially crafted FLAC file, trick the victim into opening it, trigger a segmentation violation and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

5) Buffer overflow (CVE-ID: CVE-2017-8361)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to buffer overflow in the flac_buffer_copy function in flac.c. A remote attacker can send a specially crafted audio file, trick the victim into opening it, trigger memory corruption and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

6) Out-of-bounds read (CVE-ID: CVE-2017-8362)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read in the flac_buffer_copy function in flac.c. A remote attacker can send a specially crafted audio file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

7) Heap-based buffer overflow (CVE-ID: CVE-2017-8363)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to heap-based buffer over-read in the flac_buffer_copy function in flac.c in libsndfile. A remote attacker can send a specially crafted audio file, trick the victim into opening it, trigger memory corruption and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

8) Buffer over-read (CVE-ID: CVE-2017-8365)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to buffer over-read in the i2les_array function in pcm.c in libsndfile. A remote attacker can send a specially crafted audio file, trick the victim into opening it and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.