SB2020061534 - Gentoo update for FAAD2



SB2020061534 - Gentoo update for FAAD2

Published: June 15, 2020 Updated: June 15, 2020

Security Bulletin ID SB2020061534
Severity
Medium
Patch available
YES
Number of vulnerabilities 17
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Medium 29% Low 71%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 17 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2018-19502)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the function excluded_channels() in libfaad/syntax.c. A remote attacker can trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Stack-based buffer overflow (CVE-ID: CVE-2018-19503)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the function calculate_gain() in libfaad/sbr_hfadj.c. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) NULL pointer dereference (CVE-ID: CVE-2018-19504)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.1. There is a NULL pointer dereference in ifilter_bank() in libfaad/filtbank.c. A remote attacker can perform a denial of service (DoS) attack.


4) Stack-based buffer underflow (CVE-ID: CVE-2018-20194)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to the calculate_gain function, as defined in the libfaad/sbr_hfadj.c source code file of the affected software, mishandles noise energy level for the G_max <= G case. A local attacker can submit malicious input and trigger a stack-based buffer underflow condition that causes the affected software to crash, resulting in a DoS condition.


5) NULL pointer dereference (CVE-ID: CVE-2018-20195)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to a NULL pointer dereference in ic_predict of libfaad/ic_predict.c. A local attacker can submit malicious input and trigger a segmentation fault that causes the affected software to crash, resulting in a DoS condition.


6) Stack-based buffer overflow (CVE-ID: CVE-2018-20196)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to the calculate_gain function, as defined in the libfaad/sbr_hfadj.c source code file of the affected software, mishandles the S_M array. A local attacker can submit malicious input and trigger a stack-based buffer overflow condition that causes the affected software to crash, resulting in a DoS condition.


7) Stack-based buffer underflow (CVE-ID: CVE-2018-20197)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to the calculate_gain function, as defined in the libfaad/sbr_hfadj.c source code file of the affected software, mishandles noise energy level for the G_max = G case. A local attacker can submit malicious input and trigger a stack-based buffer underflow condition that causes the affected software to crash, resulting in a DoS condition.


8) NULL pointer dereference (CVE-ID: CVE-2018-20198)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to a NULL pointer dereference in ifilter_bank of libfaad/filtbank.c. A local attacker can submit trigger a segmentation fault that causes the affected software to crash, resulting in a DoS condition because adding to windowed output is mishandled in the LONG_START_SEQUENCE case.


9) NULL pointer dereference (CVE-ID: CVE-2018-20199)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to a NULL pointer dereference in ifilter_bank of libfaad/filtbank.c. A local attacker can trigger a segmentation fault that causes the affected software to crash, resulting in a DoS condition because adding to windowed output is mishandled in the ONLY_LONG_SEQUENCE case. 


10) NULL pointer dereference (CVE-ID: CVE-2018-20357)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in sbr_process_channel of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash. A remote attacker can perform a denial of service (DoS) attack.


11) Buffer overflow (CVE-ID: CVE-2018-20358)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

An invalid memory address dereference was discovered in the lt_prediction function of libfaad/lt_predict.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.


12) Buffer overflow (CVE-ID: CVE-2018-20359)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

An invalid memory address dereference was discovered in the sbrDecodeSingleFramePS function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.


13) Buffer overflow (CVE-ID: CVE-2018-20360)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

An invalid memory address dereference was discovered in the sbr_process_channel function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.


14) Buffer overflow (CVE-ID: CVE-2018-20361)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

An invalid memory address dereference was discovered in the hf_assembly function of libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.


15) NULL pointer dereference (CVE-ID: CVE-2018-20362)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash because adding to windowed output is mishandled in the EIGHT_SHORT_SEQUENCE case. A remote attacker can perform a denial of service (DoS) attack.


16) Buffer overflow (CVE-ID: CVE-2019-15296)

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow is later performed via getdword_n(&ld->start[words], ld->bytes_left).


17) Out-of-bounds read (CVE-ID: CVE-2019-6956)

The vulnerability allows a local attacker to cause DoS condition.

The vulnerability exists due to a buffer over-read condition in the ps_mix_phase function, as defined in the libfaad/ps_dec.c source code file. A local attacker can submit a malicious input to the targeted system, trigger a buffer over-read condition and cause the affected application to crash.


Remediation

Install update from vendor's website.