First published: Wed Dec 31 2014(Updated: )
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sound Exchange Project Sound Exchange | <=14.4.1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Oracle Solaris | =11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.