FreeBSD : libsndfile -- PAF file processing integer overflow (b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Hossein Lotfi has discovered a vulnerability in libsndfile, which can
be exploited by malicious people to potentially compromise an
application using the library. The vulnerability is caused due to an
integer overflow error in the 'paf24_init()' function (src/paf.c) when
processing Paris Audio (PAF) files. This can be exploited to cause a
heap-based buffer overflow via a specially crafted file. Successful
exploitation may allow execution of arbitrary code. The vulnerability
is confirmed in version 1.0.24. Other versions may also be affected.

See also :

http://www.nessus.org/u?ecce8ca4

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 56169 ()

Bugtraq ID:

CVE ID: CVE-2011-2696

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now