10
CVSSv2

CVE-2004-0557

Published: 06/08/2004 Updated: 11/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 up to and including 12.17.4 allow remote malicious users to execute arbitrary code via certain WAV file header fields.

Vulnerable Product Search on Vulmon Subscribe to Product

sox sox 12.17.4

conectiva linux 10.0

sox sox 12.17.2

sox sox 12.17.3

conectiva linux 8.0

conectiva linux 9.0

gentoo linux 1.4

redhat enterprise linux 3.0

redhat enterprise linux desktop 3.0

redhat fedora core core_1.0

redhat fedora core core_2.0

Vendor Advisories

Synopsis sox security update Type/Severity Security Advisory: Important Topic Updated sox packages that fix buffer overflows in the WAV file handlingcode are now available Description SoX (Sound eXchange) is a sound file format converter SoX can convertbetween many different digitized sou ...
Ulf Härnhammar has reported two vulnerabilities in SoX, a universal sound sample translator, which may be exploited by malicious people to compromise a user's system with a specially crafted wav file For the stable distribution (woody) these problems have been fixed in version 12173-4woody2 For the unstable distribution (sid) these problems h ...

Exploits

//--------------------------------- Begin Code: sox-exploiterc --------------------------------- /* Copyright Rosiello Security 2004 wwwrosielloorg CVE Reference: CAN-2004-0557 Bug Type: Stack Overflow Date: 01/08/2004 Ulf Harnhammar reported that there are two buffer overflows in the 'sox' and 'play' commands The ...
# POC Exploit for SoX Stack Overflow Vulnerability found by Ulf Harnhammar # Tested Under Slackware 91 # Serkan Akpolat sakpolat@gmxnet | deicide@siyahsapkaorg # Homepage: deicidesiyahsapkaorg # Greets to: Virulent # deicide@gate:~$ play britneywav # sh-205b$ # "jmp %esp" from libcso , change this if needed retJmpEsp=0x4029824B # ...