*** This bug is a security vulnerability *** Public security bug reported:
CVE-2008-2109 description: "field.c in the libid3tag 0.15.0b library allows context-dependent attackers to cause a denial of service (CPU consumption) via an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an infinite loop." http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2109 Despite its version number, libid3tag0 version 0.15.1b-10 from Hardy does contain the vulnerable code. So do the versions from previous releases, I guess. ** Affects: libid3tag (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2109 -- [CVE-2008-2109] Denial of service via the ID3_FIELD_TYPE_STRINGLIST field https://bugs.launchpad.net/bugs/230620 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
