|
Message-ID: <20081111083029.GC29534@suse.de> Date: Tue, 11 Nov 2008 09:30:29 +0100 From: Thomas Biege <thomas@...e.de> To: oss-security@...ts.openwall.com Cc: coley@...us.mitre.org Subject: Re: CVE request: libcdaudio On Tue, Nov 11, 2008 at 09:22:16AM +0100, Tomas Hoger wrote: > On Mon, 10 Nov 2008 10:20:41 -0500 (EST) "Steven M. Christey" > <coley@...us.mitre.org> wrote: > > > > we need a CVE-ID for a buffer overflow in libcdaudio. > > > It is a remotely exploitable heap-based buffer overflow. > > > > Out of curiosity, what makes it remote? > > > > Use CVE-2008-5030 > > I guess this wording was used by Thomas as the affected code is used to > talk to remote CDDB servers, from which you obtain list of tracks for > your audio CD. If remote CDDB server is untrusted / compromised, it > can send you a crafted reply that can exploit libcdaudio flaw on your > system. Yes, everybody can add CDDB entries to servers like freedb.org (honestly I didn't test it) or intercept the HTTP connection to a CDDB server. -- Bye, Thomas -- Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg) -- Hamming's Motto: The purpose of computing is insight, not numbers. -- Richard W. Hamming
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.