Vulnerability Name: | CVE-2012-6303 (CCN-76869) | ||||||||||||||||||||||||||||||||
Assigned: | 2012-07-12 | ||||||||||||||||||||||||||||||||
Published: | 2012-07-12 | ||||||||||||||||||||||||||||||||
Updated: | 2018-10-30 | ||||||||||||||||||||||||||||||||
Summary: | Heap-based buffer overflow in the GetWavHeader function in generic/jkSoundFile.c in the Snack Sound Toolkit, as used in WaveSurfer 1.8.8p4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large chunk size in a WAV file. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:U/RC:UR)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:UR)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-6303 Source: SUSE Type: Third Party Advisory openSUSE-SU-2015:0382 Source: CCN Type: SA49889 Snack Sound Toolkit "GetWavHeader()" Buffer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 49889 Source: CCN Type: SA49926 WaveSurfer WAV Processing Buffer Overflow Vulnerabilities Source: GENTOO Type: Third Party Advisory GLSA-201309-04 Source: CCN Type: WaveSurfer Web site WaveSurfer Source: EXPLOIT-DB Type: Exploit, VDB Entry 19772 Source: MANDRIVA Type: Broken Link MDVSA-2013:126 Source: MLIST Type: Mailing List, Third Party Advisory [oss-secuirty] 20131210 CVE-2012-6303 WaveSurfer and Snack Sound Toolkit buffer overflows Source: CCN Type: OSVDB ID: 83813 Snack Sound Toolkit generic/jkSoundFile.c GetWavHeader() Function WAV File Handling Memory Corruption Source: CCN Type: BID-54419 Snack Sound Toolkit 'GetWavHeader()' Function Buffer Overflow Vulnerability Source: CCN Type: TMH, Speech, Music and Hearing Web site The Snack Sound Toolkit Source: XF Type: UNKNOWN wavesurfer-wav-dos(76869) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [07-12-2012] | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |