|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: libsndfile|
|Summary:||FreeBSD Ports: libsndfile|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following package is affected: libsndfile
Integer overflow in libsndfile before 1.0.25 allows remote attackers
to cause a denial of service (application crash) or possibly execute
arbitrary code via a crafted PARIS Audio Format (PAF) file that
triggers a heap-based buffer overflow.
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2011-2696|
Debian Security Information: DSA-2288 (Google Search)
SuSE Security Announcement: openSUSE-SU-2011:0855 (Google Search)
BugTraq ID: 48644
|Copyright||Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com|
|This is only one of 56160 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.