Описание
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
Ссылки
- ExploitVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- Vendor Advisory
- Exploit
- Vendor Advisory
- ExploitVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
EPSS
5.1 Medium
CVSS2
Дефекты
Связанные уязвимости
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earli ...
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
EPSS
5.1 Medium
CVSS2