Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 468906 - <media-sound/abcmidi-2013.05.07: Repeat String Parsing Buffer Overflow Vulnerability
Summary: <media-sound/abcmidi-2013.05.07: Repeat String Parsing Buffer Overflow Vulner...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/53318/
Whiteboard: ~2 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-05-07 18:22 UTC by Agostino Sarubbo
Modified: 2013-08-29 14:53 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-05-07 18:22:10 UTC
From ${URL} :

Description
A vulnerability has been reported in abcMIDI, which can be exploited by malicious people to 
potentially compromise a user's system.

The vulnerability is caused due to a boundary error when parsing the repeat string in ABC files and 
can potentially be exploited to cause a stack-based buffer overflow.

Successful exploitation may allow execution of arbitrary code, but requires tricking the user into 
opening a specially crafted ABC file.

The vulnerability is reported in versions prior to 2013-04-30.


Solution
Update to version 2013-04-30.

Provided and/or discovered by
Reported by the vendor.

Original Advisory
http://freecode.com/projects/abcmidi/releases/354373


@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not
Comment 1 Sean Amoss (RETIRED) gentoo-dev Security 2013-05-10 15:49:49 UTC
Maintainers, please drop vulnerable versions.
Comment 2 Agostino Sarubbo gentoo-dev 2013-08-29 14:53:24 UTC
(In reply to Sean Amoss from comment #1)
> Maintainers, please drop vulnerable versions.

Was done time ago. Closing as noglsa