Описание
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | released | 2.0.1-2 |
| edgy | ignored | end of life, was needed |
| feisty | released | 2.0.1-2 |
| gutsy | released | 2.0.1-2 |
| hardy | released | 2.0.1-2 |
| intrepid | released | 2.0.1-2 |
| jaunty | released | 2.0.1-2 |
| karmic | released | 2.0.1-2 |
| upstream | needs-triage |
Показывать по
Ссылки на источники
5.1 Medium
CVSS2
Связанные уязвимости
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earli ...
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
5.1 Medium
CVSS2