English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

libsndfile PAF File Processing Integer Overflow Vulnerability


Secunia ID

SA45125

CVE-ID

CVE-2011-2696

Release Date

12 Jul 2011

Last Change

21 Jul 2011

Criticality

Highly Critical

Solution Status

Vendor Patch

Software

libsndfile 1.x

Where

From remote

Impact
System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Description

Hossein Lotfi has discovered a vulnerability in libsndfile, which can be exploited by malicious people to potentially compromise an application using the library.

The vulnerability is caused due to an integer overflow error in the "paf24_init()" function (src/paf.c) when processing Paris Audio (PAF) files. This can be exploited to cause a heap-based buffer overflow via a specially crafted file.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is confirmed in version 1.0.24. Other versions may also be affected.

Solution

Update to version 1.0.25.

Reported by

Hossein Lotfi via Secunia