DEBIAN-CVE-2009-0135

Source
https://security-tracker.debian.org/tracker/CVE-2009-0135
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2009-0135.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2009-0135
Upstream
Published
2009-01-16T18:30:00.233Z
Modified
2025-11-14T03:18:35.473497Z
Summary
[none]
Details

Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.

References

Affected packages

Debian:13 / amarok

Package

Name
amarok
Purl
pkg:deb/debian/amarok?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.10-2

Ecosystem specific

{
    "urgency": "medium"
}

Debian:14 / amarok

Package

Name
amarok
Purl
pkg:deb/debian/amarok?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.10-2

Ecosystem specific

{
    "urgency": "medium"
}