CVE-2008-1423

NameCVE-2008-1423
DescriptionInteger overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1591-1
Debian Bugs482518, 669196

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvorbis (PTS)buster1.3.6-2fixed
bookworm, bullseye1.3.7-1fixed
sid, trixie1.3.7-2fixed
libvorbisidec (PTS)buster1.2.1+git20180316-3fixed
bookworm, bullseye, sid, trixie1.2.1+git20180316-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvorbissourceetch1.1.2.dfsg-1.4DSA-1591-1
libvorbissource(unstable)1.2.0.dfsg-3.1482518
libvorbisidecsource(unstable)1.0.2+svn18153-0.1669196

Notes

[squeeze] - libvorbisidec <no-dsa> (Minor issue, no dev-deps)

Search for package or bug name: Reporting problems