SB2019092442 - Stack-based buffer overflow in faad2 (Alpine package)
Published: September 24, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2018-20196)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists due to the calculate_gain function, as defined in the libfaad/sbr_hfadj.c source code file of the affected software, mishandles the S_M array. A local attacker can submit malicious input and trigger a stack-based buffer overflow condition that causes the affected software to crash, resulting in a DoS condition.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=345e3811719177be2d2edbf507a394cf92cfccb6
- https://git.alpinelinux.org/aports/commit/?id=3a9fa508128d243abee97ef41bd84a7847515f61
- https://git.alpinelinux.org/aports/commit/?id=e84bc7cecdbbd1563791416fd42384b047dc8c52
- https://git.alpinelinux.org/aports/commit/?id=fc0275095ee7d946a66d1f1e4713a943ccc05b78
- https://git.alpinelinux.org/aports/commit/?id=3f110aff54a0ff10332ae53c70a0fdc4fbd9f4ec