First published: Wed Oct 09 2013(Updated: )
Multiple stack-based and heap-based buffer overflows in Network Audio System (NAS) 1.9.3 allow local users to cause a denial of service (crash) or possibly execute arbitrary code via the (1) display command argument to the ProcessCommandLine function in server/os/utils.c; (2) ResetHosts function in server/os/access.c; (3) open_unix_socket, (4) open_isc_local, (5) open_xsight_local, (6) open_att_local, or (7) open_att_svr4_local function in server/os/connection.c; the (8) AUDIOHOST environment variable to the CreateWellKnownSockets or (9) AmoebaTCPConnectorThread function in server/os/connection.c; or (10) unspecified vectors related to logging in the osLogMsg function in server/os/aulog.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
radscan Network Audio System | =1.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4256 is classified as a high severity vulnerability due to the potential for denial of service and arbitrary code execution.
To mitigate CVE-2013-4256, update the Network Audio System to the latest version or apply relevant patches that address these buffer overflow vulnerabilities.
CVE-2013-4256 affects Network Audio System version 1.9.3 and Ubuntu Linux versions 12.04, 12.10, and 13.04.
CVE-2013-4256 primarily allows local users to exploit the vulnerability but may lead to remote execution in certain configurations.
The potential impacts of CVE-2013-4256 include system crashes and the possibility of executing arbitrary code leading to unauthorized access.