Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 up to and including 2.0.1 allow remote malicious users to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
amarok amarok 2.0 |
||
amarok amarok 1.4.10 |
||
amarok amarok 2.0.1 |