First published: Fri Dec 16 2016(Updated: )
Incorrect emulation of the SPC700 audio co-processor of the Super Nintendo Entertainment System allows the execution of arbitrary code if a malformed SPC music file is opened. References: <a href="http://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html">http://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html</a> <a href="http://seclists.org/oss-sec/2016/q4/682">http://seclists.org/oss-sec/2016/q4/682</a> CVE assignments: <a href="http://seclists.org/oss-sec/2016/q4/692">http://seclists.org/oss-sec/2016/q4/692</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.2 | |
openSUSE | =12.1 | |
openSUSE Leap | =42.1 | |
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Workstation Extension | =12 | |
SUSE Linux Enterprise Server | =12 | |
game-music-emu | <=0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9957 has a high severity rating due to its potential to allow arbitrary code execution.
To fix CVE-2016-9957, update the affected software to the latest version that addresses this vulnerability.
CVE-2016-9957 affects specific versions of openSUSE and SUSE Linux software including Leap 42.1, Leap 42.2, and various versions of SUSE Linux Enterprise.
CVE-2016-9957 can facilitate attacks where an attacker can execute arbitrary code by opening a malformed SPC music file.
The best workaround for CVE-2016-9957 is to avoid opening SPC music files in the affected software until it is updated.