Package: cheesetracker
Version: 0.9.9-1 0.9.9-5
Severity: serious
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2006-3814: "Buffer overflow in the
Loader_XM::load_instrument_internal function in loader_xm.cpp for Cheese
Tracker 0.9.9 and earlier allows user-assisted attackers to execute
arbitrary code via a crafted file with a large amount of extra data."

I have confirmed this issue with both sarge's and sid's version of
cheesetracker.  A sample exploit [1] was included in the original report
[2].  I do not believe a patch is available.

Please mention the CVE in your changelog.

Thanks,

Alec

[1] http://aluigi.org/poc/cheesebof.zip
[2] http://aluigi.altervista.org/adv/cheesebof-adv.txt

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEy3ZVAud/2YgchcQRAjF1AKCaNDkUWiMgYlaqUSkjGzRsk0AMpgCeIKbH
KCBHGaofbXVoBpn1Im/qToc=
=4fQX
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to