Package: alsaplayer
Severity: grave
Tags: security patch
Justification: user security hole

The following security issues were reported by Luigi Auriemma. 

"""
Luigi Auriemma has reported some vulnerabilities in AlsaPlayer, which
potentially can be exploited by malicious people to compromise a user's system.

1) A boundary error exists in the "reconnect()" function in reader/http/http.c
during the handling of HTTP connections. This can be exploited to cause a
stack-based buffer overflow when receiving a specially crafted "Location" HTTP
response header.

Successful exploitation may allow execution of arbitrary code, but requires
that the client connects to a malicious server.

2) A boundary error in the functions used for adding items to the playlist can
be exploited to cause a buffer overflow via e.g. an overly long URL.

Successful exploitation may allow execution of arbitrary code, but requires
that the GTK interface is used.

3) Two boundary errors exist in the "cddb_lookup()" function in
input/ccda/cdda_engine.c when performing a query to a CDDB server. This can be
exploited to cause stack-based buffer overflows when receiving a specially
crafted CDDB response.

Successful exploitation may allow execution of arbitrary code when querying a
malicious CDDB server.

The vulnerabilities have been reported in version 0.99.76. Other versions may
also be affected.
"""

http://secunia.com/advisories/21422/
http://aluigi.altervista.org/adv/alsapbof-adv.txt

Hubert Chan wrote the attached patch which fix these three issues.

Thanks to Stefan Fritsch for informing us on this issue. 

Cheers, Paul

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-1-powerpc
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Attachment: signature.asc
Description: Digital signature

Reply via email to