tcl-snack: code execution
Package(s): | tcl-snack | CVE #(s): | CVE-2012-6303 | ||||||||||||||||||||||||
Created: | January 14, 2013 | Updated: | February 26, 2015 | ||||||||||||||||||||||||
Description: | From the Secunia Advisory:
Two vulnerabilities have been discovered in Snack Sound Toolkit, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to missing boundary checks in the "GetWavHeader()" function (generic/jkSoundFile.c) when parsing either format sub-chunks or unknown sub-chunks. This can be exploited to cause a heap-based buffer overflow via specially crafted WAV files with overly large chunk sizes specified. Successful exploitation may allow execution of arbitrary code. | ||||||||||||||||||||||||||
Alerts: |
|