This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Fedora Core host is missing a security update.
Updated sox packages that fix buffer overflows in the WAV file
handling code are now available. Buffer overflows existed in the
parsing of WAV file header fields. It was possible that a malicious
WAV file could have caused arbitrary code to be executed when the file
was played or converted.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected sox, sox-debuginfo and / or sox-devel packages.
Risk factor :
Critical / CVSS Base Score : 10.0