Vulnerability Name: | CVE-2007-6277 (CCN-39508) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2018-10-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: EEYE Type: UNKNOWN AD20071115 Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: SECUNIA Type: UNKNOWN 28548 Source: SREASON Type: UNKNOWN 3423 Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: UNKNOWN DSA-1469 Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: CERT-VN Type: Patch, US Government Resource VU#544656 Source: BUGTRAQ Type: UNKNOWN 20071115 EEYE: Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: SECTRACK Type: Patch 1018974 Source: XF Type: UNKNOWN flac-metadata-block-bo(39508) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10435 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration RedHat 9: ![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39509) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2018-10-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.4 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-vorbis-comment-bo(39509) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39510) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-vorbis-comment-value-bo(39510) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39511) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-mime-type-bo(39511) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39513) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-mime-type-value-bo(39513) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39514) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-picture-dimension-bo(39514) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39515) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-picture-description-bo(39515) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39516) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-picture-description-value-bo(39516) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39517) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-picture-data-bo(39517) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39518) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-picture-url-bo(39518) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2007-6277 (CCN-39520) | ||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||
Updated: | 2007-11-15 | ||||||||||||||||||||||||||||
Summary: | Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. Note: some of these issues may overlap CVE-2007-4619. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-6277 Source: CCN Type: FLAC Web site FLAC - Free Lossless Audio Codec Source: CCN Type: eEye Digital Security Advisory AD20071115 Multiple Vulnerabilities In .FLAC File Format and Various Media Applications Source: CCN Type: RHSA-2007-0975 Important: flac security update Source: CCN Type: SECTRACK ID: 1018974 FLAC Buffer Overflows, Double Free Errors, and Other Bugs Let Remote Users Execute Arbitrary Code Source: DEBIAN Type: DSA-1469 flac -- several vulnerabilities Source: CCN Type: US-CERT VU#544656 libFLAC contains multiple vulnerabilities Source: XF Type: UNKNOWN flac-padding-length-bo(39520) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |