1
Candidate: CVE-2009-0135
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135
5
http://trapkit.de/advisories/TKADV2009-002.txt
6
http://www.debian.org/security/2009/dsa-1706
7
https://usn.ubuntu.com/usn/usn-739-1
9
Multiple integer overflows in the Audible::Tag::readTag function in
10
metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote
11
attackers to execute arbitrary code via an Audible Audio (.aa) file with a
12
large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based
17
https://bugs.launchpad.net/ubuntu/+source/amarok/+bug/318555
18
http://bugs.gentoo.org/show_bug.cgi?id=254896
19
https://bugzilla.redhat.com/show_bug.cgi?id=479560
20
https://bugzilla.redhat.com/show_bug.cgi?id=479946
26
upstream: http://websvn.kde.org/?view=rev&revision=908391 (trunk)
27
upstream: http://websvn.kde.org/?view=rev&revision=908401 (2.0.x)
28
upstream: http://websvn.kde.org/?view=rev&revision=908415 (1.4.x)
29
vendor: http://patch-tracking.debian.net/patch/series/view/amarok/1.4.10-3/20_security_audible_tags.diff
30
upstream_amarok: released (2.0.1.1-1)
31
dapper_amarok: not-affected (code not present)
32
gutsy_amarok: released (2:1.4.7-0ubuntu3.2)
33
hardy_amarok: released (2:1.4.9.1-0ubuntu3.2)
34
intrepid_amarok: released (2:1.4.10-0ubuntu3.1)
35
devel_amarok: not-affected (2.0.1.1-0ubuntu5)