SB2022032846 - Debian update for faad2



SB2022032846 - Debian update for faad2

Published: March 28, 2022

Security Bulletin ID SB2022032846
Severity
High
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 40% Medium 10% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2018-20196)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to the calculate_gain function, as defined in the libfaad/sbr_hfadj.c source code file of the affected software, mishandles the S_M array. A local attacker can submit malicious input and trigger a stack-based buffer overflow condition that causes the affected software to crash, resulting in a DoS condition.


2) NULL pointer dereference (CVE-ID: CVE-2018-20199)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to a NULL pointer dereference in ifilter_bank of libfaad/filtbank.c. A local attacker can trigger a segmentation fault that causes the affected software to crash, resulting in a DoS condition because adding to windowed output is mishandled in the ONLY_LONG_SEQUENCE case. 


3) Buffer overflow (CVE-ID: CVE-2018-20360)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

An invalid memory address dereference was discovered in the sbr_process_channel function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.


4) Out-of-bounds read (CVE-ID: CVE-2019-6956)

The vulnerability allows a local attacker to cause DoS condition.

The vulnerability exists due to a buffer over-read condition in the ps_mix_phase function, as defined in the libfaad/ps_dec.c source code file. A local attacker can submit a malicious input to the targeted system, trigger a buffer over-read condition and cause the affected application to crash.


5) Heap-based buffer overflow (CVE-ID: CVE-2021-32272)

The vulnerability allows a remote attacker to execute code on the vulnerable system.

The vulnerability exists due to a boundary error in the stszin() function located in mp4read.c. A remote attacker can trick the victim to open a specially crafted file and execute code on the vulnerable system.


6) Stack-based buffer overflow (CVE-ID: CVE-2021-32273)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the ftypin() function in mp4read.c. A remote attacker can trick the victim to open a specially crafted file and execute code on the vulnerable system.


7) Heap-based buffer overflow (CVE-ID: CVE-2021-32274)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the sbr_qmf_synthesis_64() function in sbr_qmf.c. A remote attacker can trick the victim to open a specially crafted data, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


8) NULL pointer dereference (CVE-ID: CVE-2021-32276)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in get_sample() function in output.c. A remote attacker can trick the victim to open a specially crafted data and perform a denial of service (DoS) attack.


9) Heap-based buffer overflow (CVE-ID: CVE-2021-32277)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the sbr_qmf_analysis_32() function in sbr_qmf.c. A remote attacker can trick the victim to open a specially crafted data, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


10) Heap-based buffer overflow (CVE-ID: CVE-2021-32278)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open specially crafted data, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


Remediation

Install update from vendor's website.