A buffer overflow in Snack could result in execution of arbitrary code or Denial of Service.
Package | dev-tcltk/snack on all architectures |
---|---|
Affected versions | < 2.2.10-r5 |
Unaffected versions | >= 2.2.10-r5 |
Snack is a sound toolkit for creating multi-platform audio applications with scripting languages.
The GetWavHeader() function in jkSoundFile.c does not have boundary checks when parsing format sub-chunks or unknown sub-chunks.
A remote attacker could entice a user to open a specially crafted WAV file with an application using Snack, possibly resulting in execution of arbitrary code or a Denial of Service condition.
There is no known workaround at this time.
All Snack users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-tcltk/snack-2.2.10-r5"
Release date
September 11, 2013
Latest revision
September 11, 2013: 1
Severity
normal
Exploitable
remote
Bugzilla entries