Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <2650419.lEoOq43ulC@devil>
Date: Mon, 22 Apr 2013 13:01:17 +0200
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: libxmp MASI Parsing Buffer Overflow Vulnerability

>From the secunia advisory SA53114[1]:

Description
A vulnerability has been reported in libxmp, which can be exploited by 
malicious people to compromise an application using the library.

The vulnerability is caused due to a boundary error in the "get_dsmp"() 
function (src/loaders/masi_load.c) when parsing MASI files, which can be 
exploited to cause a buffer overflow.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is reported in versions prior to 4.1.0.


Solution
Update to version 4.1.0.

Provided and/or discovered by
The vendor credits Douglas Carmichael.

Original Advisory
http://sourceforge.net/projects/xmp/files/libxmp/4.1.0/Changelog/view

Commit:
http://sourceforge.net/p/xmp/libxmp/ci/a015fdfb478a60172fd225632a11bbd02870fc40/


[1]: https://secunia.com/advisories/53114/
-- 
Agostino Sarubbo
Gentoo Linux Developer

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.