Csound getnum() getnum Function Multiple Buffer Overflows

High Nessus Plugin ID 58989


The remote host has an application installed that is affected by multiple buffer overflow vulnerabilities.


The version of Csound installed on the remote Windows host is less than 5.16.6. As such, it is reportedly affected by multiple stack- based buffer overflows present in the getnum() function located in util/heti_main.c and util/pv_import.c

By tricking a user into opening a specially crafted file, an attacker may be able to execute arbitrary code subject to the user's privileges.


Upgrade to Csound version 5.16.6 or later.

See Also



Plugin Details

Severity: High

ID: 58989

File Name: csound_getnum_buffer_overflow.nasl

Version: $Revision: 1.5 $

Type: local

Agent: windows

Family: Windows

Published: 2012/05/04

Modified: 2017/02/03

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:csounds:csound

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/02/13

Vulnerability Publication Date: 2012/02/24

Exploitable With

Metasploit (Csound hetro File Handling Stack Buffer Overflow)

Reference Information

CVE: CVE-2012-0270

BID: 52144

OSVDB: 79491, 79492

EDB-ID: 18710