Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000223

Опубликовано: 20 авг. 2018
Источник: debian
EPSS Низкий

Описание

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
soundtouchfixed2.1.2+ds1-1package
soundtouchno-dsastretchpackage
soundtouchno-dsajessiepackage

Примечания

  • https://gitlab.com/soundtouch/soundtouch/issues/6

EPSS

Процентиль: 77%
0.01057
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.

CVSS3: 4.2
redhat
больше 7 лет назад

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.

CVSS3: 8.8
nvd
больше 7 лет назад

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.

suse-cvrf
больше 7 лет назад

Security update for soundtouch

suse-cvrf
больше 7 лет назад

Security update for soundtouch

EPSS

Процентиль: 77%
0.01057
Низкий