// For flags

CVE-2007-1543

Gentoo Linux Security Advisory 200704-20

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in the accept_att_local function in server/os/connection.c in Network Audio System (NAS) before 1.8a SVN 237 allows remote attackers to execute arbitrary code via a long path slave name in a USL socket connection.

Desbordamiento de búfer basado en pila en la función accept_att_local en server/os/connection.c de Network Audio System (NAS) anterior a 1.8a SVN 237 permite a atacantes remotos ejecutar código de su elección mediante un nombre largo una conexión de socket USL.

Several vulnerabilities have been discovered in nas, the Network Audio System. A stack-based buffer overflow in the accept_att_local function in server/os/connection.c in nas allows remote attackers to execute arbitrary code via a long path slave name in a USL socket connection. Integer overflow in the ProcAuWriteElement function in server/dia/audispatch.c allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large max_samples value. The AddResource function in server/dia/resource.c allows remote attackers to cause a denial of service (server crash) via a nonexistent client ID. Array index error allows remote attackers to cause a denial of service (crash) via (1) large num_action values in the ProcAuSetElements function in server/dia/audispatch.c or (2) a large inputNum parameter to the compileInputs function in server/dia/auutil.c. The ReadRequestFromClient function in server/os/io.c allows remote attackers to cause a denial of service (crash) via multiple simultaneous connections, which triggers a NULL pointer dereference.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-03-20 CVE Reserved
  • 2007-03-20 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Radscan
Search vendor "Radscan"
Network Audio System
Search vendor "Radscan" for product "Network Audio System"
1.8a
Search vendor "Radscan" for product "Network Audio System" and version "1.8a"
-
Affected
in Mandrakesoft
Search vendor "Mandrakesoft"
Mandrake Linux
Search vendor "Mandrakesoft" for product "Mandrake Linux"
2007
Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "2007"
-
Safe
Radscan
Search vendor "Radscan"
Network Audio System
Search vendor "Radscan" for product "Network Audio System"
1.8a
Search vendor "Radscan" for product "Network Audio System" and version "1.8a"
-
Affected
in Mandrakesoft
Search vendor "Mandrakesoft"
Mandrake Linux
Search vendor "Mandrakesoft" for product "Mandrake Linux"
2007
Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "2007"
x86_64
Safe