<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200407-23"> <title>SoX: Multiple buffer overflows</title> <synopsis> SoX contains two buffer overflow vulnerabilities in the WAV header parser code. </synopsis> <product type="ebuild">SoX</product> <announced>2004-07-30</announced> <revised count="02">2006-05-22</revised> <bug>58733</bug> <access>remote</access> <affected> <package name="media-sound/sox" auto="yes" arch="*"> <unaffected range="ge">12.17.4-r2</unaffected> <vulnerable range="le">12.17.4-r1</vulnerable> </package> </affected> <background> <p> SoX is a command line utility that can convert various formats of computer audio files in to other formats. </p> </background> <description> <p> Ulf Harnhammar discovered two buffer overflows in the sox and play commands when handling WAV files with specially crafted header fields. </p> </description> <impact type="normal"> <p> By enticing a user to play or convert a specially crafted WAV file an attacker could execute arbitrary code with the permissions of the user running SoX. </p> </impact> <workaround> <p> There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of SoX. </p> </workaround> <resolution> <p> All SoX users should upgrade to the latest version: </p> <code> # emerge sync # emerge -pv ">=media-sound/sox-12.17.4-r2" # emerge ">=media-sound/sox-12.17.4-r2"</code> </resolution> <references> <uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1141.html">Full Disclosure Announcement</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0557">CVE-2004-0557</uri> </references> <metadata tag="submitter"> jaervosz </metadata> </glsa>