First published: Wed Dec 31 2014(Updated: )
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sound Exchange | <=14.4.1 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8145 has a high severity rating due to multiple heap-based buffer overflows that can lead to remote code execution.
CVE-2014-8145 affects Sound eXchange (SoX) version 14.4.1 and earlier.
To fix CVE-2014-8145, upgrade to SoX version 14.4.2 or later which contains patches for this vulnerability.
CVE-2014-8145 allows remote attackers to execute arbitrary code through crafted WAV files.
CVE-2014-8145 impacts Debian 7.0, Debian 8.0, and Oracle Solaris 11.2 among others.