Home / vulnerabilities TKADV2009-002.txt
Posted on 12 January 2009
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: Amarok Integer Overflow and Unchecked Allocation
Vulnerabilities
Advisory ID: TKADV2009-002
Revision: 1.0
Release Date: 2009/01/11
Last Modified: 2009/01/11
Date Reported: 2009/01/05
Author: Tobias Klein (tk at trapkit.de)
Affected Software: Amarok < version 2.0.1.1
Remotely Exploitable: Yes
Locally Exploitable: No
Vendor URL: http://amarok.kde.org/
Vendor Status: Vendor has released an updated version
Patch development time: 7 days
======================
Vulnerability Details:
======================
Amarok contains several integer overflows and unchecked allocation
vulnerabilities while parsing malformed Audible digital audio files.
The vulnerabilities may be exploited by a (remote) attacker to execute
arbitrary code in the context of Amarok.
==================
Technical Details:
==================
Source code file from Amarok 2.0:
amarok-2.0srcmetadataaudibleaudibletag.cpp
[...]
140 bool Audible::Tag::readTag( FILE *fp, char **name, char **value)
141 {
142 quint32 nlen;
143 [1] if ( fread(&nlen, sizeof(nlen), 1, fp) != 1 )
144 return false;
145
146 nlen = ntohl(nlen);
147 //fprintf(stderr, "tagname len=%x
", (unsigned)nlen);
148 [2] *name = new char[nlen+1];
149 [4] (*name)[nlen] = '