USN-3241-1: audiofile vulnerabilities

Ubuntu Security Notice USN-3241-1

22nd March, 2017

audiofile vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

audiofile could be made to crash or run programs if it opened a specially
crafted file.

Software description

  • audiofile
    – Open-source version of the SGI audiofile library

Details

Agostino Sarubbo discovered that audiofile incorrectly handled certain
malformed audio files. If a user or automated system were tricked into
processing a specially crafted audio file, a remote attacker could cause
applications linked against audiofile to crash, leading to a denial of
service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
libaudiofile1

0.3.6-2ubuntu0.14.04.2
Ubuntu 12.04 LTS:
libaudiofile1

0.3.3-2ubuntu0.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-6827,

CVE-2017-6828,

CVE-2017-6829,

CVE-2017-6830,

CVE-2017-6831,

CVE-2017-6832,

CVE-2017-6833,

CVE-2017-6834,

CVE-2017-6835,

CVE-2017-6836,

CVE-2017-6837,

CVE-2017-6838,

CVE-2017-6839

CVE-2016-5752

The SAML2 implementation in Identity Server in NetIQ Access Manager 4.1 before 4.1.2 HF1 and 4.2 before 4.2.2 was handling unsigned SAML requests incorrectly, leaking results to a potentially malicious “Assertion Consumer Service URL” instead of the original requester.

CVE-2016-5747

A security vulnerability in cookie handling in the http stack implementation in NDSD in Novell eDirectory before 9.0.1 allows remote attackers to bypass intended access restrictions by leveraging predictable cookies.

CVE-2016-5749

NetIQ Access Manager 4.1 before 4.1.2 HF 1 and 4.2 before 4.2.2 was parsing incoming SAML requests with external entity resolution enabled, which could lead to local file disclosure via an XML External Entity (XXE) attack.

CVE-2016-9167

NDSD in Novell eDirectory before 9.0.2 did not calculate ACLs on LDAP objects across partition boundaries correctly, which could lead to a privilege escalation by modifying user attributes that would otherwise be filtered by an ACL.