|
|
| |
|
| |
tcl-snack: code execution
| Package(s): | tcl-snack |
CVE #(s): | CVE-2012-6303
|
| Created: | January 14, 2013 |
Updated: | January 25, 2013 |
| Description: |
From the Secunia Advisory:
Two vulnerabilities have been discovered in Snack Sound Toolkit, which can be exploited by malicious people to compromise a user's system.
The vulnerabilities are caused due to missing boundary checks in the "GetWavHeader()" function (generic/jkSoundFile.c) when parsing either format sub-chunks or unknown sub-chunks. This can be exploited to cause a heap-based buffer overflow via specially crafted WAV files with overly large chunk sizes specified.
Successful exploitation may allow execution of arbitrary code. |
| Alerts: |
|
( Log in to post comments)
|
|
|