CVE-2004-0557

Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields.
References
Link Resource
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000855
http://lwn.net/Articles/95529/
http://lwn.net/Articles/95530/
http://seclists.org/fulldisclosure/2004/Jul/1227.html
http://secunia.com/advisories/12175
http://www.debian.org/security/2004/dsa-565
http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:076
http://www.redhat.com/support/errata/RHSA-2004-409.html Patch Vendor Advisory
http://www.securityfocus.com/bid/10819 Exploit Patch Vendor Advisory
https://bugzilla.fedora.us/show_bug.cgi?id=1945
https://exchange.xforce.ibmcloud.com/vulnerabilities/16827
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000855
http://lwn.net/Articles/95529/
http://lwn.net/Articles/95530/
http://seclists.org/fulldisclosure/2004/Jul/1227.html
http://secunia.com/advisories/12175
http://www.debian.org/security/2004/dsa-565
http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:076
http://www.redhat.com/support/errata/RHSA-2004-409.html Patch Vendor Advisory
http://www.securityfocus.com/bid/10819 Exploit Patch Vendor Advisory
https://bugzilla.fedora.us/show_bug.cgi?id=1945
https://exchange.xforce.ibmcloud.com/vulnerabilities/16827
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sox:sox:12.17.2:*:*:*:*:*:*:*
cpe:2.3:a:sox:sox:12.17.3:*:*:*:*:*:*:*
cpe:2.3:a:sox:sox:12.17.4:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html - () http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000855 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000855 -
References () http://lwn.net/Articles/95529/ - () http://lwn.net/Articles/95529/ -
References () http://lwn.net/Articles/95530/ - () http://lwn.net/Articles/95530/ -
References () http://seclists.org/fulldisclosure/2004/Jul/1227.html - () http://seclists.org/fulldisclosure/2004/Jul/1227.html -
References () http://secunia.com/advisories/12175 - () http://secunia.com/advisories/12175 -
References () http://www.debian.org/security/2004/dsa-565 - () http://www.debian.org/security/2004/dsa-565 -
References () http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml - Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:076 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:076 -
References () http://www.redhat.com/support/errata/RHSA-2004-409.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-409.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10819 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/10819 - Exploit, Patch, Vendor Advisory
References () https://bugzilla.fedora.us/show_bug.cgi?id=1945 - () https://bugzilla.fedora.us/show_bug.cgi?id=1945 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16827 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16827 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801 -

Information

Published : 2004-08-06 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0557

Mitre link : CVE-2004-0557

CVE.ORG link : CVE-2004-0557


JSON object : View

Products Affected

redhat

  • fedora_core
  • enterprise_linux
  • enterprise_linux_desktop

conectiva

  • linux

gentoo

  • linux

sox

  • sox