Description
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1471-1 | New libvorbis packages fix several vulnerabilities |
EUVD |
EUVD-2007-4013 | libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c. |
Ubuntu USN |
USN-498-1 | libvorbis vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T14:37:06.107Z
Reserved: 2007-07-26T00:00:00.000Z
Link: CVE-2007-4029
No data.
Status : Modified
Published: 2007-07-26T22:30:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-4029
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN