First published: Tue Mar 20 2007(Updated: )
Stack-based buffer overflow in the accept_att_local function in server/os/connection.c in Network Audio System (NAS) before 1.8a SVN 237 allows remote attackers to execute arbitrary code via a long path slave name in a USL socket connection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mandrake Linux | =2007 | |
Mandrake Linux | =2007 | |
radscan Network Audio System | =1.8a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1543 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2007-1543, update to the latest version of the Network Audio System that addresses this vulnerability.
CVE-2007-1543 specifically affects versions of the Network Audio System prior to 1.8a SVN 237.
Yes, CVE-2007-1543 can be exploited remotely through the USL socket connection with a crafted long path slave name.
If immediate patching is not possible for CVE-2007-1543, consider implementing network segmentation and access controls to mitigate potential attacks.