#VU33282 Heap-based buffer overflow in libsndfile - CVE-2015-7805
Published: November 17, 2015 / Updated: August 4, 2020
libsndfile
Erik de Castro Lopo
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in libsndfile 1.0.25. A remote attacker can use the headindex value in the header in an AIFF file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171466.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172593.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172607.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html
- http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html
- http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/
- http://www.openwall.com/lists/oss-security/2015/11/03/3
- http://www.openwall.com/lists/oss-security/2015/11/03/7
- http://www.securityfocus.com/bid/77427
- http://www.ubuntu.com/usn/USN-2832-1
- https://security.gentoo.org/glsa/201612-03
- https://www.exploit-db.com/exploits/38447/