Описание
soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | released | 2.1.2+ds1-1 |
| disco | released | 2.1.2+ds1-1 |
| eoan | released | 2.1.2+ds1-1 |
| esm-apps/bionic | released | 1.9.2-3ubuntu0.1~esm1 |
| esm-apps/focal | released | 2.1.2+ds1-1 |
| esm-apps/jammy | released | 2.1.2+ds1-1 |
| esm-apps/xenial | released | 1.9.2-2+deb9u1ubuntu0.1~esm1 |
| esm-infra-legacy/trusty | released | 1.7.1-5ubuntu0.1~esm1 |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
soundtouch version up to and including 2.0.0 contains a Buffer Overflo ...
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3