----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/

----------------------------------------------------------------------

TITLE:
Debian update for libcdaudio

SECUNIA ADVISORY ID:
SA32678

VERIFY ADVISORY:
http://secunia.com/advisories/32678/

CRITICAL:
Moderately critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/advisories/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/advisories/product/530/

DESCRIPTION:
Debian has issued an update for libcdaudio. This fixes a
vulnerability, which can be exploited by malicious people to
compromise an application using the library.

The vulnerability is caused due to a boundary error within the
function "cddb_read_disc_data()" in src/cddb.c, which can be
exploited cause a heap-based buffer overflow by e.g. tricking an
application using the library into processing a specially crafted
CDDB entry.

SOLUTION:
Apply updated packages.

Note: Updated packages for the HPPA architecture are still missing.
Reportedly, these will be available soon.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio_0.99.12p2-2+etch1.dsc
Size/MD5 checksum: 637 4edcf130e77084b440f551d9a9afdc3a
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio_0.99.12p2-2+etch1.diff.gz
Size/MD5 checksum: 17703 6e523c81ea161401162d39d981e27cf2
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio_0.99.12p2.orig.tar.gz
Size/MD5 checksum: 356047 15de3830b751818a54a42899bd3ae72c

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_alpha.deb
Size/MD5 checksum: 53334 1dc4587c71e25acb6b2dfd305de703e2
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_alpha.deb
Size/MD5 checksum: 70916 83fa3fc0e729bba0a3319745960dc81a

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_amd64.deb
Size/MD5 checksum: 46040 a75b35f50ad88e2b1ee36d0a3266406a
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_amd64.deb
Size/MD5 checksum: 50674 7baf7f19121adeb98bb2a0afacf7cf27

arm architecture (ARM)

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_arm.deb
Size/MD5 checksum: 43132 ff9d61d012abc44a459eac7350cfb46a
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_arm.deb
Size/MD5 checksum: 46664 3e023f637034444d6b8217bff8867f77

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_i386.deb
Size/MD5 checksum: 44708 87710ccd10182a65bae04f90071e56a1
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_i386.deb
Size/MD5 checksum: 46326 601bdafb162a116affa4111e3322caed

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_ia64.deb
Size/MD5 checksum: 64314 65aa3e3f94daad3963d28214c4f36e7d
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_ia64.deb
Size/MD5 checksum: 73338 3ac92a48b4c0e7ac41b3307453a5ffcc

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_mips.deb
Size/MD5 checksum: 56370 1539c8ca203536ef7199144c8ad95855
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_mips.deb
Size/MD5 checksum: 44942 25f255285e3fea6dc44f8e0637f54b84

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_mipsel.deb
Size/MD5 checksum: 56114 3e94f1d9586cfac7b25bc3b5f7dd604d
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_mipsel.deb
Size/MD5 checksum: 45066 8323996086dd5a88a0877b6047fc9163

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_powerpc.deb
Size/MD5 checksum: 51406 f34b4f764921545c487bdde8f7af47ed
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_powerpc.deb
Size/MD5 checksum: 46432 3f65b0704dbb59ff502376d84ba58be3

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_s390.deb
Size/MD5 checksum: 50238 c1bbc7d605a19ca7d806a81a3dd605f7
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_s390.deb
Size/MD5 checksum: 47156 6cb47c376172882afcd25f75387025e6

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio-dev_0.99.12p2-2+etch1_sparc.deb
Size/MD5 checksum: 46930 15e80ffff1a35904512d088476a99a50
http://security.debian.org/pool/updates/main/libc/libcdaudio/libcdaudio1_0.99.12p2-2+etch1_sparc.deb
Size/MD5 checksum: 42532 fff8099843f655f50c9caab7ebbcbad7

-- Debian GNU/Linux unstable alias sid --

Fixed in version 0.99.12p2-7.

ORIGINAL ADVISORY:
DSA-1665-1:
http://lists.debian.org/debian-security-announce/2008/msg00257.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------