Csound getnum() getnum Function Multiple Buffer Overflows

high Nessus Plugin ID 58989

Synopsis

The remote host has an application installed that is affected by multiple buffer overflow vulnerabilities.

Description

The version of Csound installed on the remote Windows host is less than 5.16.6. As such, it is reportedly affected by multiple stack- based buffer overflows present in the getnum() function located in util/heti_main.c and util/pv_import.c

By tricking a user into opening a specially crafted file, an attacker may be able to execute arbitrary code subject to the user's privileges.

Solution

Upgrade to Csound version 5.16.6 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2012-3/

http://www.nessus.org/u?5b3b83d2

Plugin Details

Severity: High

ID: 58989

File Name: csound_getnum_buffer_overflow.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 5/4/2012

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:csounds:csound

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/13/2012

Vulnerability Publication Date: 2/24/2012

Exploitable With

Metasploit (Csound hetro File Handling Stack Buffer Overflow)

Reference Information

CVE: CVE-2012-0270

BID: 52144