openSUSE Security Update : lame (openSUSE-2018-214)

critical Nessus Plugin ID 107048

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for lame fixes the following issues :

Lame was updated to version 3.100 :

- Improved detection of MPEG audio data in RIFF WAVE files. sf#3545112 Invalid sampling detection

- New switch --gain <decibel>, range -20.0 to +12.0, a more convenient way to apply Gain adjustment in decibels, than the use of --scale <factor>.

- Fix for sf#3558466 Bug in path handling

- Fix for sf#3567844 problem with Tag genre

- Fix for sf#3565659 no progress indication with pipe input

- Fix for sf#3544957 scale (empty) silent encode without warning

- Fix for sf#3580176 environment variable LAMEOPT doesn't work anymore

- Fix for sf#3608583 input file name displayed with wrong character encoding (on windows console with CP_UTF8)

- Fix dereference NULL and Buffer not NULL terminated issues. (CVE-2017-15019 bsc#1082317 CVE-2017-13712 bsc#1082399 CVE-2015-9100 bsc#1082401)

- Fix dereference of a NULL pointer possible in loop.

- Make sure functions with SSE instructions maintain their own properly aligned stack. Thanks to Fabian Greffrath

- Multiple Stack and Heap Corruptions from Malicious File.
(CVE-2017-9872 bsc#1082391 CVE-2017-9871 bsc#1082392 CVE-2017-9870 bsc#1082393 CVE-2017-9869 bsc#1082395 CVE-2017-9411 bsc#1082397 CVE-2015-9101 bsc#1082400)

- CVE-2017-11720: Fix a division by zero vulnerability.
(bsc#1082311)

- CVE-2017-9410: Fix fill_buffer_resample function in libmp3lame/util.c heap-based buffer over-read and ap (bsc#1082333)

- CVE-2017-9411: Fix fill_buffer_resample function in libmp3lame/util.c invalid memory read and application crash (bsc#1082397)

- CVE-2017-9412: FIx unpack_read_samples function in frontend/get_audio.c invalid memory read and application crash (bsc#1082340)

- Fix clip detect scale suggestion unaware of scale input value

- HIP decoder bug fixed: decoding mixed blocks of lower sample frequency Layer3 data resulted in internal buffer overflow.

- Add lame_encode_buffer_interleaved_int()

Solution

Update the affected lame packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1082311

https://bugzilla.opensuse.org/show_bug.cgi?id=1082317

https://bugzilla.opensuse.org/show_bug.cgi?id=1082333

https://bugzilla.opensuse.org/show_bug.cgi?id=1082340

https://bugzilla.opensuse.org/show_bug.cgi?id=1082391

https://bugzilla.opensuse.org/show_bug.cgi?id=1082392

https://bugzilla.opensuse.org/show_bug.cgi?id=1082393

https://bugzilla.opensuse.org/show_bug.cgi?id=1082395

https://bugzilla.opensuse.org/show_bug.cgi?id=1082397

https://bugzilla.opensuse.org/show_bug.cgi?id=1082399

https://bugzilla.opensuse.org/show_bug.cgi?id=1082400

https://bugzilla.opensuse.org/show_bug.cgi?id=1082401

Plugin Details

Severity: Critical

ID: 107048

File Name: openSUSE-2018-214.nasl

Version: 3.4

Type: local

Agent: unix

Published: 2/28/2018

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libmp3lame0, p-cpe:/a:novell:opensuse:libmp3lame-devel, p-cpe:/a:novell:opensuse:lame-debuginfo, p-cpe:/a:novell:opensuse:libmp3lame0-debuginfo, p-cpe:/a:novell:opensuse:lame-debugsource, p-cpe:/a:novell:opensuse:libmp3lame0-32bit, p-cpe:/a:novell:opensuse:libmp3lame0-debuginfo-32bit, cpe:/o:novell:opensuse:42.3, p-cpe:/a:novell:opensuse:lame-mp3rtp-debuginfo, p-cpe:/a:novell:opensuse:lame-mp3rtp, p-cpe:/a:novell:opensuse:lame

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/26/2018

Reference Information

CVE: CVE-2015-9100, CVE-2015-9101, CVE-2017-11720, CVE-2017-13712, CVE-2017-15019, CVE-2017-9410, CVE-2017-9411, CVE-2017-9412, CVE-2017-9869, CVE-2017-9870, CVE-2017-9871, CVE-2017-9872