Updated libid3tag packages fix security vulnerabilities
Publication date: 09 May 2018Modification date: 09 May 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2004-2779 , CVE-2008-2109 , CVE-2017-11550 , CVE-2017-11551
Description
id3_utf16_deserialize() in utf16.c in libid3tag through 0.15.1b
misparses ID3v2 tags encoded in UTF-16 with an odd number of bytes,
triggering an endless loop allocating memory until an OOM condition is
reached, leading to denial-of-service (DoS). (CVE-2004-2779)
field.c in the libid3tag 0.15.0b library allows context-dependent
attackers to cause a denial of service (CPU consumption) via an
ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an
infinite loop. (CVE-2008-2109)
The id3_ucs4_length function in ucs4.c in libid3tag 0.15.1b allows
remote attackers to cause a denial of service (NULL Pointer Dereference
and application crash) via a crafted mp3 file. (CVE-2017-11550)
The id3_field_parse function in field.c in libid3tag 0.15.1b allows
remote attackers to cause a denial of service (OOM) via a crafted MP3
file. (CVE-2017-11551)
References
SRPMS
5/core
- libid3tag-0.15.1b-16.2.mga5
6/core
- libid3tag-0.15.1b-17.2.mga6