6.8
CVSSv2

CVE-2008-5824

Published: 02/01/2009 Updated: 26/03/2010
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file.

Vulnerable Product Search on Vulmon Subscribe to Product

68k audiofile 0.2.6

Vendor Advisories

Debian Bug report logs - #510205 buffer overflow in libaudiofile Package: libaudiofile0; Maintainer for libaudiofile0 is (unknown); Reported by: Max Kellermann <max@duempelorg> Date: Tue, 30 Dec 2008 13:30:02 UTC Severity: grave Tags: etch, lenny, patch, security Found in version audiofile/026-6 Fixed in versions audio ...
It was discovered that Audio File Library contained a heap-based buffer overflow If a user or automated system processed a crafted WAV file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program The default compiler options for Ubuntu should reduc ...
Max Kellermann discovered a heap-based buffer overflow in the handling of ADPCM WAV files in libaudiofile This flaw could result in a denial of service (application crash) or possibly execution of arbitrary code via a crafted WAV file The old stable distribution (etch), this problem will be fixed in version 026-6+etch1 The packages for the old ...

Exploits

source: wwwsecurityfocuscom/bid/33066/info Audio File Library ('libaudiofile') is prone to a heap-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data An attacker can exploit this issue to execute arbitrary machine code in the context of applications using the vulnerable library Failed exploi ...