Integer overflow in the pv_import function in util/pv_import.c in Csound 5.16.6, when converting a file, allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/48148 | third-party-advisory x_refsource_SECUNIA |
| http://csound.git.sourceforge.net/git/gitweb.cgi?p=csound/csound5.git%3Ba=commitdiff%3Bh=61d1df45ca9a52bab62892a3c3a13c41e6384505#patch3 | x_refsource_CONFIRM |
| http://secunia.com/secunia_research/2012-7/ | x_refsource_MISC |
| http://www.osvdb.org/81016 | vdb-entry x_refsource_OSVDB |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/74647 | vdb-entry x_refsource_XF |
| http://lists.opensuse.org/opensuse-updates/2012-04/msg00057.html | vendor-advisory x_refsource_SUSE |
| http://www.openwall.com/lists/oss-security/2012/04/16/1 | mailing-list x_refsource_MLIST |
| http://www.securityfocus.com/bid/52875 | vdb-entry x_refsource_BID |
| http://csound.git.sourceforge.net/git/gitweb.cgi?p=csound/csound5.git%3Ba=commitdiff%3Bh=7d617a9551fb6c552ba16874b71266fcd90f3a6f | x_refsource_CONFIRM |
| https://bugzilla.redhat.com/show_bug.cgi?id=810802 | x_refsource_MISC |
| http://www.openwall.com/lists/oss-security/2012/04/16/9 | mailing-list x_refsource_MLIST |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|