GLSA-201612-30 : SoX: User-assisted execution of arbitrary code

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201612-30
(SoX: User-assisted execution of arbitrary code)

A heap-based buffer overflow can be triggered when processing a
malicious NIST Sphere or WAV audio file.

Impact :

A remote attacker could coerce the victim to run SoX against their
malicious file. This may be leveraged by an attacker to gain control of
program execution with the privileges of the user.

Workaround :

There is no known workaround at this time.

See also :

https://security.gentoo.org/glsa/201612-30

Solution :

All SoX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-sound/sox-14.4.2'

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 95698 ()

Bugtraq ID:

CVE ID: CVE-2014-8145

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now