---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: AlsaPlayer Multiple Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA21422 VERIFY ADVISORY: http://secunia.com/advisories/21422/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: AlsaPlayer 0.x http://secunia.com/product/11328/ DESCRIPTION: Luigi Auriemma has reported some vulnerabilities in AlsaPlayer, which potentially can be exploited by malicious people to compromise a user's system. 1) A boundary error exists in the "reconnect()" function in reader/http/http.c during the handling of HTTP connections. This can be exploited to cause a stack-based buffer overflow when receiving a specially crafted "Location" HTTP response header. Successful exploitation may allow execution of arbitrary code, but requires that the client connects to a malicious server. 2) A boundary error in the functions used for adding items to the playlist can be exploited to cause a buffer overflow via e.g. an overly long URL. Successful exploitation may allow execution of arbitrary code, but requires that the GTK interface is used. 3) Two boundary errors exist in the "cddb_lookup()" function in input/ccda/cdda_engine.c when performing a query to a CDDB server. This can be exploited to cause stack-based buffer overflows when receiving a specially crafted CDDB response. Successful exploitation may allow execution of arbitrary code when querying a malicious CDDB server. The vulnerabilities have been reported in version 0.99.76. Other versions may also be affected. SOLUTION: Use another product. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/alsapbof-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------