Page 2 of 7 results (0.002 seconds)

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 1

The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read. La función sd2_parse_rsrc_fork en sd2.c en libsndfile permite a atacantes tener un impacto no especificado a través de vectores relacionados con un (1) desplazamiento de mapa o (2) marcador rsrc, lo que provoca una lectura fuera de rango. • http://advisories.mageia.org/MGASA-2015-0015.html http://lists.opensuse.org/opensuse-updates/2015-01/msg00016.html http://secunia.com/advisories/62320 http://www.mandriva.com/security/advisories?name=MDVSA-2015:024 http://www.openwall.com/lists/oss-security/2015/01/04/4 http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html http://www.securityfocus.com/bid/71796 http://www.ubuntu.com/usn/USN-2832-1 https://github.com/erikd/libsndfile/commit/dbe14f00030af5d3577 •

CVSS: 6.8EPSS: 7%CPEs: 29EXPL: 0

Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow. Desbordamiento de entero en libsndfile anterior a v1.0.25 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código arbitrario a través de un fichero manipulado con formato de audio PARIS (PAF), lo que provoca un desbordamiento de búfer basado en heap. • http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062955.html http://secunia.com/advisories/45125 http://secunia.com/advisories/45351 http://secunia.com/advisories/45384 http://secunia.com/advisories/45388 http://secunia.com/advisories/45433 http://www.debian.org/security/2011/dsa-2288 http://www.mandriva.com/security/advisories?name=MDVSA-2011:119 http://www.mega-nerd.com/libsndfile/ChangeLog http://www.openwall.com/lists/oss-security/2011/07/14/1 http:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound •