6.8
CVSSv2

CVE-2007-5301

Published: 09/10/2007 Updated: 15/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the vorbis_stream_info function in input/vorbis/vorbis_engine.c (aka the vorbis input plugin) in AlsaPlayer prior to 0.99.80-rc3 allows remote malicious users to execute arbitrary code via a .OGG file with long comments.

Vulnerable Product Search on Vulmon Subscribe to Product

alsaplayer alsaplayer

Vendor Advisories

Debian Bug report logs - #446034 CVE-2007-5301 buffer overflow in vorbis input plugin Package: alsaplayer; Maintainer for alsaplayer is Paul Brossier <piem@debianorg>; Reported by: Nico Golde <nion@debianorg> Date: Wed, 10 Oct 2007 00:06:01 UTC Severity: grave Tags: patch, security Fixed in versions alsaplayer/09 ...

Exploits

Local buffer overflow exploit for Alsaplayer versions below 09980-rc3 ...
I have released this exploit for the alsaplayer bug CVE-2007-5301 You can find all the needed files at wwwwekknet/research/CVE-2007-5301/ With my modified version of vorbiscomment, you can generate a ogg exploit like this: whats@debian:~$ vorbiscommentwhats -w -t "TITLE=$(perl -e 'print "AAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAA ...
source: wwwsecurityfocuscom/bid/25969/info AlsaPlayer is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer Exploiting this issue allows attackers to execute arbitrary machine code in the context of users running the affected ap ...