oss-sec mailing list archives

Re: CVE request: Audacity <1.3.6 Buffer overflow


From: "Steven M. Christey" <coley () linus mitre org>
Date: Mon, 9 Feb 2009 19:25:33 -0500 (EST)


======================================================
Name: CVE-2009-0490
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0490
Reference: MILW0RM:7634
Reference: URL:http://www.milw0rm.com/exploits/7634
Reference: MLIST:[audacity-devel] 20090110 Audacity "String_parse::get_nonspace_quoted()" Buffer Overflow
Reference: URL:http://n2.nabble.com/Audacity-%22String_parse::get_nonspace_quoted()%22-Buffer-Overflow-td2139537.html
Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=253493
Reference: BID:33090
Reference: URL:http://www.securityfocus.com/bid/33090
Reference: FRSIRT:ADV-2009-0008
Reference: URL:http://www.frsirt.com/english/advisories/2009/0008
Reference: OSVDB:51070
Reference: URL:http://osvdb.org/51070
Reference: SECUNIA:33356
Reference: URL:http://secunia.com/advisories/33356

Stack-based buffer overflow in the String_parse::get_nonspace_quoted
function in lib-src/allegro/strparse.cpp in Audacity 1.2.6 and other
versions before 1.3.6 allows remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via a .gro file
containing a long string.



Current thread: