Vulnerability Name: | CVE-2009-0136 (CCN-47877) | ||||||||||||
Assigned: | 2009-01-11 | ||||||||||||
Published: | 2009-01-11 | ||||||||||||
Updated: | 2018-10-11 | ||||||||||||
Summary: | Multiple array index errors in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via an Audible Audio (.aa) file with a crafted (1) nlen or (2) vlen Tag value, each of which can lead to an invalid pointer dereference, or the writing of a 0x00 byte to an arbitrary memory location, after an allocation failure. | ||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Amarok Web site Magellan - Amarok 2.0.1.1 released (including security fix) | Amarok Source: CONFIRM Type: Vendor Advisory http://amarok.kde.org/en/releases/2.0.1.1 Source: CONFIRM Type: UNKNOWN http://bugs.gentoo.org/show_bug.cgi?id=254896 Source: MITRE Type: CNA CVE-2009-0136 Source: SUSE Type: UNKNOWN SUSE-SR:2009:003 Source: MLIST Type: UNKNOWN [oss-security] 20090114 CVE Request -- amarok Source: CCN Type: SA33505 Amarok Audible Audio Processing Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 33505 Source: SECUNIA Type: UNKNOWN 33522 Source: SECUNIA Type: UNKNOWN 33640 Source: SECUNIA Type: UNKNOWN 33819 Source: SECUNIA Type: UNKNOWN 34315 Source: SECUNIA Type: UNKNOWN 34407 Source: GENTOO Type: UNKNOWN GLSA-200903-34 Source: SREASON Type: UNKNOWN 4915 Source: CCN Type: SECTRACK ID: 1021558 Amarok Integer Overflow Lets Remote Users Execute Arbitrary Code Source: CCN Type: TKADV2009-002 Amarok Integer Overflow and Unchecked Allocation Vulnerabilities Source: MISC Type: Exploit http://trapkit.de/advisories/TKADV2009-002.txt Source: CONFIRM Type: UNKNOWN http://websvn.kde.org/?view=rev&revision=908391 Source: CONFIRM Type: UNKNOWN http://websvn.kde.org/?view=rev&revision=908401 Source: CONFIRM Type: UNKNOWN http://websvn.kde.org/?view=rev&revision=908415 Source: DEBIAN Type: UNKNOWN DSA-1706 Source: CCN Type: GLSA-200903-34 Amarok: User-assisted execution of arbitrary code Source: MANDRIVA Type: UNKNOWN MDVSA-2009:030 Source: BUGTRAQ Type: UNKNOWN 20090111 [TKADV2009-002] Amarok Integer Overflow and Unchecked Allocation Vulnerabilities Source: BID Type: UNKNOWN 33210 Source: CCN Type: BID-33210 Amarok 'audible.cpp' Audible File Multiple Integer Overflow and Memory Allocation Vulnerabilities Source: SECTRACK Type: UNKNOWN 1021558 Source: CCN Type: USN-739-1 Amarok vulnerabilities Source: UBUNTU Type: UNKNOWN USN-739-1 Source: VUPEN Type: UNKNOWN ADV-2009-0100 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=479560 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=479946 Source: XF Type: UNKNOWN amarok-audibletagreadtag-code-execution(47877) Source: FEDORA Type: UNKNOWN FEDORA-2009-0715 Source: SUSE Type: SUSE-SR:2009:003 SUSE Security Summary Report | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |