Giuseppe Iuculano
2009-Sep-15 11:02 UTC
[Secure-testing-team] Bug#546730: CVE-2007-6732: Buffer overflow in DTT file loader
Package: xmp Version: 2.0.4d-11 Severity: serious Tags: security -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xmp. CVE-2007-6731[0]: | Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers | to execute arbitrary code via an OXM file with a negative value, which | bypasses a check in (1) test_oxm and (2) decrunch_oxm functions in | misc/oxm.c, leading to a buffer overflow. This is already fixed in debian unstable. Please coordinate with the security team (team at security.debian.org) to prepare packages for the stable and oldstable releases. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6731 http://security-tracker.debian.net/tracker/CVE-2007-6731 Cheers, Giuseppe. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkqvdDoACgkQNxpp46476aot0gCeKr7w18XoPG1yyirwc2sfsnNC 88kAn3fVbLhhpWt8EgFAI/dvxWdrllp0 =WBlF -----END PGP SIGNATURE-----