This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing one or more security
Updated snack packages fix security vulnerability :
Two vulnerabilities have been discovered in Snack Sound Toolkit, which
are caused due to missing boundary checks in the GetWavHeader()
function (generic/jkSoundFile.c) when parsing either format sub-chunks
or unknown sub-chunks. This can be exploited to cause a heap-based
buffer overflow via specially crafted WAV files with overly large
chunk sizes specified (CVE-2012-6303).
Update the affected python-snack and / or tcl-snack packages.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : true