Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.Referenceshttp://www.vupen.com/english/advisories/2009/0585http://security.gentoo.org/glsa/glsa-200904-16.xmlhttp://www.debian.org/security/2009/dsa-1742http://www.securityfocus.com/archive/1/501413/100/0/threadedhttp://secunia.com/advisories/33981http://secunia.com/advisories/33980http://secunia.com/advisories/34642http://www.securitytracker.com/id?1021784http://secunia.com/advisories/34316https://exchange.xforce.ibmcloud.com/vulnerabilities/49038http://secunia.com/advisories/34526http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.htmlhttp://www.ubuntu.com/usn/USN-749-1http://www.mega-nerd.com/libsndfile/NEWShttp://www.vupen.com/english/advisories/2009/0584http://secunia.com/secunia_research/2009-7/http://www.securityfocus.com/bid/33963http://www.securityfocus.com/archive/1/501399/100/0/threadedhttp://secunia.com/secunia_research/2009-8/http://secunia.com/advisories/34791