Vulnerability Bulletins |
Múltiples desbordamientos de búfer en SoX |
|
Vulnerability classification |
|
Property | Value |
Confidence level | official+tested |
Impact | Obtener acceso |
Dificulty | Principiante |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software |
SoX 12.17.4 SoX 12.17.3 SoX 12.17.2 |
Description |
|
Se han descubierto dos vulnerabilidades de desbordamiento de búfer en las versiones 12.17.4, 12.17.3 y 12.17.2 del reproductor SoX. Las vulnerabilidades residen en el manejo de los archivos .wav y suceden concretamente en la función st_wavstartread() debido a una falta de validación de entrada. La explotación de estas vulnerabilidades podría permitir a un atacante remoto la ejecución de código remoto mediante el envío de un archivo .wav especialmente diseñado que la víctima debe abrir con una versión vulnerable del reproductor SoX. |
|
Solution |
|
Actualización de software Mandrake Linux Mandrakelinux 9.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/sox-12.17.3-4.1.91mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/sox-devel-12.17.3-4.1.91mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/SRPMS/sox-12.17.3-4.1.91mdk.src.rpm PPC ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/sox-12.17.3-4.1.91mdk.ppc.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/sox-devel-12.17.3-4.1.91mdk.ppc.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/SRPMS/sox-12.17.3-4.1.91mdk.src.rpm Mandrakelinux 9.2 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/sox-12.17.4-2.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/sox-devel-12.17.4-2.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/sox-12.17.4-2.1.92mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/sox-12.17.4-2.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/sox-devel-12.17.4-2.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/sox-12.17.4-2.1.92mdk.src.rpm Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/sox-12.17.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/sox-devel-12.17.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/sox-12.17.4-2.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/sox-12.17.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/sox-devel-12.17.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/sox-12.17.4-2.1.100mdk.src.rpm Mandrake Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/sox-12.17.3-4.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/sox-devel-12.17.3-4.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/sox-12.17.3-4.1.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/sox-12.17.3-4.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/sox-devel-12.17.3-4.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/sox-12.17.3-4.1.C21mdk.src.rpm Red Hat Linux Red Hat Desktop (v. 3) AMD64 sox-12.17.4-4.3.x86_64.rpm sox-devel-12.17.4-4.3.x86_64.rpm SRPMS sox-12.17.4-4.3.src.rpm i386 sox-12.17.4-4.3.i386.rpm sox-devel-12.17.4-4.3.i386.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux AS (v. 3) AMD64 sox-12.17.4-4.3.x86_64.rpm sox-devel-12.17.4-4.3.x86_64.rpm SRPMS sox-12.17.4-4.3.src.rpm i386 sox-12.17.4-4.3.i386.rpm sox-devel-12.17.4-4.3.i386.rpm ia64 sox-12.17.4-4.3.ia64.rpm sox-devel-12.17.4-4.3.ia64.rpm ppc sox-12.17.4-4.3.ppc.rpm sox-devel-12.17.4-4.3.ppc.rpm s390 sox-12.17.4-4.3.s390.rpm sox-devel-12.17.4-4.3.s390.rpm s390x sox-12.17.4-4.3.s390x.rpm sox-devel-12.17.4-4.3.s390x.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux ES (v. 3) AMD64 sox-12.17.4-4.3.x86_64.rpm sox-devel-12.17.4-4.3.x86_64.rpm SRPMS sox-12.17.4-4.3.src.rpm i386 sox-12.17.4-4.3.i386.rpm sox-devel-12.17.4-4.3.i386.rpm ia64 sox-12.17.4-4.3.ia64.rpm sox-devel-12.17.4-4.3.ia64.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux WS (v. 3) AMD64 sox-12.17.4-4.3.x86_64.rpm sox-devel-12.17.4-4.3.x86_64.rpm SRPMS sox-12.17.4-4.3.src.rpm i386 sox-12.17.4-4.3.i386.rpm sox-devel-12.17.4-4.3.i386.rpm ia64 sox-12.17.4-4.3.ia64.rpm sox-devel-12.17.4-4.3.ia64.rpm https://rhn.redhat.com/ Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2.dsc http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2.diff.gz http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_alpha.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_alpha.deb ARM http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_arm.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_i386.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_ia64.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_ia64.deb HP Precision http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_hppa.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_m68k.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_mips.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_mipsel.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_powerpc.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_s390.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_sparc.deb http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_sparc.deb |
|
Standar resources |
|
Property | Value |
CVE | CAN-2004-0557 |
BID | |
Other resources |
|
Ulf Härnhammar Security Advisory http://seclists.org/lists/fulldisclosure/2004/Jul/1229.html Mandrakesoft Security Advisory MDKSA-2004:076 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:076 Red Hat Security Advisory RHSA-2004:409-05 https://rhn.redhat.com/errata/RHSA-2004-409.html Debian Security Advisory DSA 565-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00172.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2004-07-29 |
2.0 | Añadido aviso publicado por Ulf Härnhammar. Aviso emitido por Red Hat (RHSA-2004:409-05). | 2004-07-30 |
2.1 | Exploit público disponible. Vulnerabilidad comprobada. | 2004-08-02 |
2.2 | Aviso emitido por Debian (DSA 565-1) | 2004-10-14 |