Описание
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 14.4.1-5 |
| bionic | not-affected | 14.4.1-5 |
| cosmic | not-affected | 14.4.1-5 |
| devel | not-affected | 14.4.1-5 |
| esm-apps/bionic | not-affected | 14.4.1-5 |
| esm-apps/xenial | released | 14.4.1-5ubuntu0.1 |
| esm-infra-legacy/trusty | released | 14.4.1-3ubuntu1.1 |
| lucid | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
Показывать по
Ссылки на источники
7.5 High
CVSS2
Связанные уязвимости
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 an ...
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
7.5 High
CVSS2