1 results (0.006 seconds)

CVSS: 9.3EPSS: 0%CPEs: 13EXPL: 0

Buffer overflow in src/src_sinc.c in Secret Rabbit Code (aka SRC or libsamplerate) before 0.1.4, when "extreme low conversion ratios" are used, allows user-assisted attackers to have an unknown impact via a crafted audio file. Desbordamiento de búfer en src/src_sinc.c de Secret Rabbit Code (también conocido como SRC o libsamplerate) versiones anteriores a 0.1.4, cuando "extreme low conversion ratios" es utilizado, permite a atacantes asistidos por usuario tener un impacto desconocido a través de un fichero de audio manipulado. • http://security.gentoo.org/glsa/glsa-200812-05.xml http://www.mandriva.com/security/advisories?name=MDVSA-2008:238 http://www.mega-nerd.com/SRC/ChangeLog http://www.openwall.com/lists/oss-security/2008/11/03/6 http://www.securityfocus.com/bid/32090 https://exchange.xforce.ibmcloud.com/vulnerabilities/46542 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •