FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  536757
Date:      2020-05-28
Time:      10:20:23Z
Committer: cmt

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
633716fa-1f8f-11dd-b143-0211d880e350vorbis-tools -- Speex header processing vulnerability

Secunia reports:

A vulnerability has been reported in vorbis-tools, which can potentially be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an input validation error when processing Speex headers, which can be exploited via a specially crafted Speex stream containing a negative "modeID" field in the header.

Successful exploitation may allow execution of arbitrary code.


Discovery 2008-04-18
Entry 2008-05-11
vorbis-tools
lt 1.2.0_2,3

CVE-2008-1686
http://secunia.com/advisories/29882/
a35f415d-572a-11e5-b0a4-f8b156b6dcc8vorbis-tools, opus-tools -- multiple vulnerabilities

Paris Zoumpouloglou reports:

I discovered an integer overflow issue in oggenc, related to the number of channels in the input WAV file. The issue triggers an out-of-bounds memory access which causes oggenc to crash.

Paris Zoumpouloglou reports:

A crafted WAV file with number of channels set to 0 will cause oggenc to crash due to a division by zero issue.

pengsu reports:

I discovered an buffer overflow issue in oggenc/audio.c when it tries to open invalid aiff file.


Discovery 2015-08-08
Entry 2015-09-09
Modified 2015-09-09
vorbis-tools
lt 1.4.0_10,3

opus-tools
lt 0.1.9_2

ports/202941
https://trac.xiph.org/ticket/2136
CVE-2014-9639
https://trac.xiph.org/ticket/2137
CVE-2014-9638
https://trac.xiph.org/ticket/2212
CVE-2015-6749
633716fa-1f8f-11dd-b143-0211d880e350vorbis-tools -- Speex header processing vulnerability

Secunia reports:

A vulnerability has been reported in vorbis-tools, which can potentially be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an input validation error when processing Speex headers, which can be exploited via a specially crafted Speex stream containing a negative "modeID" field in the header.

Successful exploitation may allow execution of arbitrary code.


Discovery 2008-04-18
Entry 2008-05-11
vorbis-tools
lt 1.2.0_2,3

CVE-2008-1686
http://secunia.com/advisories/29882/