Description
Multiple buffer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via large (1) Metadata Block Size, (2) VORBIS Comment String Size, (3) Picture Metadata MIME-TYPE Size, (4) Picture Description Size, (5) Picture Data Length, (6) Padding Length, and (7) PICTURE Metadata width and height values in a .FLAC file, which result in a heap-based overflow; and large (8) VORBIS Comment String Size Length, (9) Picture MIME-Type, (10) Picture MIME-Type URL, and (11) Picture Description Length values in a .FLAC file, which result in a stack-based overflow. NOTE: some of these issues may overlap CVE-2007-4619.
Published: 2007-12-07
Score: 9.3 Critical
EPSS: 18.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1469-1 New flac packages fix arbitrary code execution
History

No history.

Subscriptions

Flac Libflac
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T16:02:35.937Z

Reserved: 2007-12-07T00:00:00.000Z

Link: CVE-2007-6277

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-12-07T11:46:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-6277

cve-icon Redhat

Severity : Moderate

Publid Date: 2007-11-15T00:00:00Z

Links: CVE-2007-6277 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses