Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and previous versions allow remote malicious users to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sound exchange project sound exchange |
||
debian debian linux 7.0 |
||
debian debian linux 8.0 |
||
oracle solaris 11.2 |