Advisories ยป MGASA-2018-0223

Updated libid3tag packages fix security vulnerabilities

Publication date: 09 May 2018
Modification date: 09 May 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2004-2779 , CVE-2008-2109 , CVE-2017-11550 , CVE-2017-11551

Description

id3_utf16_deserialize() in utf16.c in libid3tag through 0.15.1b
misparses ID3v2 tags encoded in UTF-16 with an odd number of bytes,
triggering an endless loop allocating memory until an OOM condition is
reached, leading to denial-of-service (DoS). (CVE-2004-2779)

field.c in the libid3tag 0.15.0b library allows context-dependent
attackers to cause a denial of service (CPU consumption) via an
ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an
infinite loop. (CVE-2008-2109)

The id3_ucs4_length function in ucs4.c in libid3tag 0.15.1b allows
remote attackers to cause a denial of service (NULL Pointer Dereference
and application crash) via a crafted mp3 file. (CVE-2017-11550)

The id3_field_parse function in field.c in libid3tag 0.15.1b allows
remote attackers to cause a denial of service (OOM) via a crafted MP3
file. (CVE-2017-11551)
                

References

SRPMS

5/core

6/core