Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.831431
Category:Mandrake Local Security Checks
Title:Mandriva Update for libsndfile MDVSA-2011:119 (libsndfile)
Summary:The remote host is missing an update for the 'libsndfile'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'libsndfile'
package(s) announced via the referenced advisory.

Vulnerability Insight:
A vulnerability was discovered and corrected in libsndfile:

An integer overflow flaw, leading to a heap-based buffer overflow,
was found in the way the libsndfile library processed certain
Ensoniq PARIS Audio Format (PAF) audio files. An attacker could
create a specially-crafted PAF file that, when opened, could cause
an application using libsndfile to crash or, potentially, execute
arbitrary code with the privileges of the user running the application
(CVE-2011-2696).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. The updated packages have been patched to correct this issue.

Affected Software/OS:
libsndfile on Mandriva Linux 2009.0,
Mandriva Linux 2009.0/X86_64,
Mandriva Linux 2010.1,
Mandriva Linux 2010.1/X86_64,
Mandriva Enterprise Server 5,
Mandriva Enterprise Server 5/X86_64

Solution:
Please Install the Updated Packages.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-2696
45125
http://secunia.com/advisories/45125
45351
http://secunia.com/advisories/45351
45384
http://secunia.com/advisories/45384
45388
http://secunia.com/advisories/45388
45433
http://secunia.com/advisories/45433
48644
http://www.securityfocus.com/bid/48644
DSA-2288
http://www.debian.org/security/2011/dsa-2288
FEDORA-2011-9325
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062955.html
MDVSA-2011:119
http://www.mandriva.com/security/advisories?name=MDVSA-2011:119
RHSA-2011:1084
http://www.redhat.com/support/errata/RHSA-2011-1084.html
USN-1174-1
http://www.ubuntu.com/usn/USN-1174-1
[oss-security] 20110714 CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/14/1
[oss-security] 20110714 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/14/2
http://www.openwall.com/lists/oss-security/2011/07/14/3
[oss-security] 20110714 Re: Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/14/4
[oss-security] 20110715 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/15/1
[oss-security] 20110715 Re: Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/15/3
http://www.openwall.com/lists/oss-security/2011/07/15/4
[oss-security] 20110718 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/18/1
http://www.mega-nerd.com/libsndfile/ChangeLog
http://www.securelist.com/en/advisories/45125
https://bugs.gentoo.org/show_bug.cgi?id=375125
https://bugzilla.redhat.com/show_bug.cgi?id=721234
openSUSE-SU-2011:0855
https://hermes.opensuse.org/messages/10387521
CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.