Múltiples desbordamientos de búfer en SoX
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial+tested |
Impact |
Obtener acceso |
Dificulty |
Principiante |
Required attacker level |
Acceso remoto sin cuenta a un servicio exotico |
System information
|
Property |
Value |
Affected manufacturer |
GNU/Linux |
Affected software |
SoX 12.17.4
SoX 12.17.3
SoX 12.17.2 |
Description
|
Se han descubierto dos vulnerabilidades de desbordamiento de búfer en las versiones 12.17.4, 12.17.3 y 12.17.2 del reproductor SoX. Las vulnerabilidades residen en el manejo de los archivos .wav y suceden concretamente en la función st_wavstartread() debido a una falta de validación de entrada.
La explotación de estas vulnerabilidades podría permitir a un atacante remoto la ejecución de código remoto mediante el envío de un archivo .wav especialmente diseñado que la víctima debe abrir con una versión vulnerable del reproductor SoX. |
Solution
|
Actualización de software
Mandrake Linux
Mandrakelinux 9.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/sox-12.17.3-4.1.91mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/sox-devel-12.17.3-4.1.91mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/SRPMS/sox-12.17.3-4.1.91mdk.src.rpm
PPC
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/sox-12.17.3-4.1.91mdk.ppc.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/sox-devel-12.17.3-4.1.91mdk.ppc.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/SRPMS/sox-12.17.3-4.1.91mdk.src.rpm
Mandrakelinux 9.2
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/sox-12.17.4-2.1.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/sox-devel-12.17.4-2.1.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/sox-12.17.4-2.1.92mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/sox-12.17.4-2.1.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/sox-devel-12.17.4-2.1.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/sox-12.17.4-2.1.92mdk.src.rpm
Mandrakelinux 10.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/sox-12.17.4-2.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/sox-devel-12.17.4-2.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/sox-12.17.4-2.1.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/sox-12.17.4-2.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/sox-devel-12.17.4-2.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/sox-12.17.4-2.1.100mdk.src.rpm
Mandrake Corporate Server 2.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/sox-12.17.3-4.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/sox-devel-12.17.3-4.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/sox-12.17.3-4.1.C21mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/sox-12.17.3-4.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/sox-devel-12.17.3-4.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/sox-12.17.3-4.1.C21mdk.src.rpm
Red Hat Linux
Red Hat Desktop (v. 3)
AMD64
sox-12.17.4-4.3.x86_64.rpm
sox-devel-12.17.4-4.3.x86_64.rpm
SRPMS
sox-12.17.4-4.3.src.rpm
i386
sox-12.17.4-4.3.i386.rpm
sox-devel-12.17.4-4.3.i386.rpm
https://rhn.redhat.com/
Red Hat Enterprise Linux AS (v. 3)
AMD64
sox-12.17.4-4.3.x86_64.rpm
sox-devel-12.17.4-4.3.x86_64.rpm
SRPMS
sox-12.17.4-4.3.src.rpm
i386
sox-12.17.4-4.3.i386.rpm
sox-devel-12.17.4-4.3.i386.rpm
ia64
sox-12.17.4-4.3.ia64.rpm
sox-devel-12.17.4-4.3.ia64.rpm
ppc
sox-12.17.4-4.3.ppc.rpm
sox-devel-12.17.4-4.3.ppc.rpm
s390
sox-12.17.4-4.3.s390.rpm
sox-devel-12.17.4-4.3.s390.rpm
s390x
sox-12.17.4-4.3.s390x.rpm
sox-devel-12.17.4-4.3.s390x.rpm
https://rhn.redhat.com/
Red Hat Enterprise Linux ES (v. 3)
AMD64
sox-12.17.4-4.3.x86_64.rpm
sox-devel-12.17.4-4.3.x86_64.rpm
SRPMS
sox-12.17.4-4.3.src.rpm
i386
sox-12.17.4-4.3.i386.rpm
sox-devel-12.17.4-4.3.i386.rpm
ia64
sox-12.17.4-4.3.ia64.rpm
sox-devel-12.17.4-4.3.ia64.rpm
https://rhn.redhat.com/
Red Hat Enterprise Linux WS (v. 3)
AMD64
sox-12.17.4-4.3.x86_64.rpm
sox-devel-12.17.4-4.3.x86_64.rpm
SRPMS
sox-12.17.4-4.3.src.rpm
i386
sox-12.17.4-4.3.i386.rpm
sox-devel-12.17.4-4.3.i386.rpm
ia64
sox-12.17.4-4.3.ia64.rpm
sox-devel-12.17.4-4.3.ia64.rpm
https://rhn.redhat.com/
Debian Linux
Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2.dsc
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2.diff.gz
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_alpha.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_alpha.deb
ARM
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_arm.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_i386.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_ia64.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_hppa.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_m68k.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_mips.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_mipsel.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_powerpc.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_s390.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_sparc.deb
http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_sparc.deb |
Standar resources
|
Property |
Value |
CVE |
CAN-2004-0557 |
BID |
NULL |
Other resources
|
Ulf Härnhammar Security Advisory
http://seclists.org/lists/fulldisclosure/2004/Jul/1229.html
Mandrakesoft Security Advisory MDKSA-2004:076
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:076
Red Hat Security Advisory RHSA-2004:409-05
https://rhn.redhat.com/errata/RHSA-2004-409.html
Debian Security Advisory DSA 565-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00172.html |
Version history
|
Version |
Comments |
Date |
1.0
|
Aviso emitido
|
2004-07-29
|
2.0
|
Añadido aviso publicado por Ulf Härnhammar. Aviso emitido por Red Hat (RHSA-2004:409-05).
|
2004-07-30
|
2.1
|
Exploit público disponible. Vulnerabilidad comprobada.
|
2004-08-02
|
2.2
|
Aviso emitido por Debian (DSA 565-1)
|
2004-10-14
|