speex vulnerability

Related Vulnerabilities: CVE-2008-1686  

It was discovered that Speex did not properly validate its input when processing Speex file headers. If a user or automated system were tricked into opening a specially crafted Speex file, an attacker could create a denial of service in applications linked against Speex or possibly execute arbitrary code as the user invoking the program.

The problem can be corrected by updating your system to the following package versions:

8 May 2008

speex vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 8.04 LTS
  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.06 LTS

Software Description

  • speex

Details

It was discovered that Speex did not properly validate its input when processing Speex file headers. If a user or automated system were tricked into opening a specially crafted Speex file, an attacker could create a denial of service in applications linked against Speex or possibly execute arbitrary code as the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 8.04 LTS
libspeex1 - 1.1.12-3ubuntu0.8.04.1
Ubuntu 7.10
libspeex1 - 1.1.12-3ubuntu0.7.10.1
Ubuntu 7.04
libspeex1 - 1.1.12-3ubuntu0.7.04.1
Ubuntu 6.06 LTS
libspeex1 - 1.1.11.1-1ubuntu0.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to restart applications linked against Speex to effect the necessary changes.

References