Updated libid3tag packages fix security vulnerabilities
Publication date: 09 May 2018Modification date: 09 May 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2004-2779 , CVE-2008-2109 , CVE-2017-11550 , CVE-2017-11551
Description
id3_utf16_deserialize() in utf16.c in libid3tag through 0.15.1b misparses ID3v2 tags encoded in UTF-16 with an odd number of bytes, triggering an endless loop allocating memory until an OOM condition is reached, leading to denial-of-service (DoS). (CVE-2004-2779) field.c in the libid3tag 0.15.0b library allows context-dependent attackers to cause a denial of service (CPU consumption) via an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an infinite loop. (CVE-2008-2109) The id3_ucs4_length function in ucs4.c in libid3tag 0.15.1b allows remote attackers to cause a denial of service (NULL Pointer Dereference and application crash) via a crafted mp3 file. (CVE-2017-11550) The id3_field_parse function in field.c in libid3tag 0.15.1b allows remote attackers to cause a denial of service (OOM) via a crafted MP3 file. (CVE-2017-11551)
References
SRPMS
6/core
- libid3tag-0.15.1b-17.2.mga6
5/core
- libid3tag-0.15.1b-16.2.mga5