Package: alsaplayer Severity: grave Tags: security patch Justification: user security hole
The following security issues were reported by Luigi Auriemma. """ Luigi Auriemma has reported some vulnerabilities in AlsaPlayer, which potentially can be exploited by malicious people to compromise a user's system. 1) A boundary error exists in the "reconnect()" function in reader/http/http.c during the handling of HTTP connections. This can be exploited to cause a stack-based buffer overflow when receiving a specially crafted "Location" HTTP response header. Successful exploitation may allow execution of arbitrary code, but requires that the client connects to a malicious server. 2) A boundary error in the functions used for adding items to the playlist can be exploited to cause a buffer overflow via e.g. an overly long URL. Successful exploitation may allow execution of arbitrary code, but requires that the GTK interface is used. 3) Two boundary errors exist in the "cddb_lookup()" function in input/ccda/cdda_engine.c when performing a query to a CDDB server. This can be exploited to cause stack-based buffer overflows when receiving a specially crafted CDDB response. Successful exploitation may allow execution of arbitrary code when querying a malicious CDDB server. The vulnerabilities have been reported in version 0.99.76. Other versions may also be affected. """ http://secunia.com/advisories/21422/ http://aluigi.altervista.org/adv/alsapbof-adv.txt Hubert Chan wrote the attached patch which fix these three issues. Thanks to Stefan Fritsch for informing us on this issue. Cheers, Paul -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: powerpc (ppc) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.17-1-powerpc Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
signature.asc
Description: Digital signature