Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0186

Опубликовано: 03 мар. 2009
Источник: redhat

Описание

Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=488361libsndfile: overflows may lead to execution of arbitrary code

Связанные уязвимости

ubuntu
почти 17 лет назад

Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.

nvd
почти 17 лет назад

Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.

debian
почти 17 лет назад

Integer overflow in libsndfile 1.0.18, as used in Winamp and other pro ...

github
больше 3 лет назад

Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.

fstec
больше 16 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации