Vulnerabilidad en la función SetFormatLikeSample en el control ActiveX NCTAudioFile2.AudioFile (CVE-2007-0018)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
24/01/2007
Última modificación:
09/04/2025
Descripción
Un desbordamiento de búfer en la región stack de la memoria en el control ActiveX NCTAudioFile2.AudioFile (NCTAudioFile2.dll), tal y como es usado en varios productos, permite a atacantes remotos ejecutar código arbitrario por medio de un argumento largo a la función SetFormatLikeSample. NOTA: los productos incluyen (1) NCTsoft NCTAudioStudio, NCTAudioEditor and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor y otros; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro versión 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, y otros; (12) SoftDiv Software Dexster, iVideoMAX y otros; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) CD virtual; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media y otros; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, y otros; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordnRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, y otros; (28) MP3 WAV Converter; (29) BearShare versión 6.0.2.26789; y (30) Oracle Siebel SimBuilder and CRM versiones 7.x.
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:altdo:convert_mp3_master:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:altdo:mp3_record_and_edit_audio_master:1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:americanshareware:mp3_wav_converter:3.1.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:audio_edit_magic:audio_edit_magic:9.2.3_389:*:*:*:*:*:*:* | ||
cpe:2.3:a:bearshare:bearshare:6.0.2.26789:*:*:*:*:*:*:* | ||
cpe:2.3:a:cdburnerxp:cdburnerxp_pro:3.0.116:*:*:*:*:*:*:* | ||
cpe:2.3:a:cheetahburner:cheetah_cd_burner:3.56:*:*:*:*:*:*:* | ||
cpe:2.3:a:cheetahburner:cheetah_dvd_burner:1.79:*:*:*:*:*:*:* | ||
cpe:2.3:a:code-it_softare:abasic_editor:10.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:code-it_softare:wave_mp3_editor:10.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:dandans_digital_media_products:easy_audio_editor:7.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:dandans_digital_media_products:full_audio_converter:4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:dandans_digital_media_products:music_editing_master:5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:dandans_digital_media_products:visual_video_converter:4.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:digital_borneo:audio_mixer_and_editor:1.1.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/22922
- http://secunia.com/advisories/23475
- http://secunia.com/advisories/23485
- http://secunia.com/advisories/23493
- http://secunia.com/advisories/23495
- http://secunia.com/advisories/23511
- http://secunia.com/advisories/23516
- http://secunia.com/advisories/23530
- http://secunia.com/advisories/23532
- http://secunia.com/advisories/23534
- http://secunia.com/advisories/23535
- http://secunia.com/advisories/23536
- http://secunia.com/advisories/23541
- http://secunia.com/advisories/23542
- http://secunia.com/advisories/23543
- http://secunia.com/advisories/23544
- http://secunia.com/advisories/23546
- http://secunia.com/advisories/23548
- http://secunia.com/advisories/23550
- http://secunia.com/advisories/23551
- http://secunia.com/advisories/23552
- http://secunia.com/advisories/23553
- http://secunia.com/advisories/23554
- http://secunia.com/advisories/23557
- http://secunia.com/advisories/23558
- http://secunia.com/advisories/23560
- http://secunia.com/advisories/23561
- http://secunia.com/advisories/23562
- http://secunia.com/advisories/23565
- http://secunia.com/advisories/23568
- http://secunia.com/advisories/23745
- http://secunia.com/advisories/23753
- http://secunia.com/advisories/23795
- http://secunia.com/advisories/25993
- http://secunia.com/advisories/26046
- http://secunia.com/advisories/26100
- http://secunia.com/advisories/26101
- http://secunia.com/advisories/28407
- http://secunia.com/advisories/30406
- http://secunia.com/advisories/30424
- http://secunia.com/advisories/30439
- http://secunia.com/advisories/30446
- http://secunia.com/advisories/30447
- http://secunia.com/advisories/30450
- http://secunia.com/advisories/30459
- http://secunia.com/blog/6/
- http://secunia.com/secunia_research/2007-10/advisory/
- http://secunia.com/secunia_research/2007-11/advisory/
- http://secunia.com/secunia_research/2007-12/advisory/
- http://secunia.com/secunia_research/2007-13/advisory/
- http://secunia.com/secunia_research/2007-14/advisory/
- http://secunia.com/secunia_research/2007-15/advisory/
- http://secunia.com/secunia_research/2007-16/advisory/
- http://secunia.com/secunia_research/2007-17/advisory/
- http://secunia.com/secunia_research/2007-18/advisory/
- http://secunia.com/secunia_research/2007-19/advisory/
- http://secunia.com/secunia_research/2007-2/advisory/
- http://secunia.com/secunia_research/2007-20/advisory/
- http://secunia.com/secunia_research/2007-21/advisory/
- http://secunia.com/secunia_research/2007-22/advisory/
- http://secunia.com/secunia_research/2007-23/advisory/
- http://secunia.com/secunia_research/2007-24/advisory/
- http://secunia.com/secunia_research/2007-25/advisory/
- http://secunia.com/secunia_research/2007-26/advisory/
- http://secunia.com/secunia_research/2007-27/advisory/
- http://secunia.com/secunia_research/2007-28/advisory/
- http://secunia.com/secunia_research/2007-29/advisory/
- http://secunia.com/secunia_research/2007-3/advisory/
- http://secunia.com/secunia_research/2007-30/advisory/
- http://secunia.com/secunia_research/2007-31/advisory/
- http://secunia.com/secunia_research/2007-32/advisory/
- http://secunia.com/secunia_research/2007-33/advisory/
- http://secunia.com/secunia_research/2007-34/advisory/
- http://secunia.com/secunia_research/2007-4/advisory/
- http://secunia.com/secunia_research/2007-5/advisory/
- http://secunia.com/secunia_research/2007-50/advisory/
- http://secunia.com/secunia_research/2007-6/advisory/
- http://secunia.com/secunia_research/2007-7/advisory/
- http://secunia.com/secunia_research/2007-8/advisory/
- http://secunia.com/secunia_research/2007-9/advisory/
- http://www.kb.cert.org/vuls/id/292713
- http://www.securityfocus.com/archive/1/457936/100/200/threaded
- http://www.securityfocus.com/archive/1/457940/100/200/threaded
- http://www.securityfocus.com/archive/1/457965/100/200/threaded
- http://www.securityfocus.com/bid/22196
- http://www.securityfocus.com/bid/23892
- http://www.vupen.com/english/advisories/2007/0310
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31707
- http://secunia.com/advisories/22922
- http://secunia.com/advisories/23475
- http://secunia.com/advisories/23485
- http://secunia.com/advisories/23493
- http://secunia.com/advisories/23495
- http://secunia.com/advisories/23511
- http://secunia.com/advisories/23516
- http://secunia.com/advisories/23530
- http://secunia.com/advisories/23532
- http://secunia.com/advisories/23534
- http://secunia.com/advisories/23535
- http://secunia.com/advisories/23536
- http://secunia.com/advisories/23541
- http://secunia.com/advisories/23542
- http://secunia.com/advisories/23543
- http://secunia.com/advisories/23544
- http://secunia.com/advisories/23546
- http://secunia.com/advisories/23548
- http://secunia.com/advisories/23550
- http://secunia.com/advisories/23551
- http://secunia.com/advisories/23552
- http://secunia.com/advisories/23553
- http://secunia.com/advisories/23554
- http://secunia.com/advisories/23557
- http://secunia.com/advisories/23558
- http://secunia.com/advisories/23560
- http://secunia.com/advisories/23561
- http://secunia.com/advisories/23562
- http://secunia.com/advisories/23565
- http://secunia.com/advisories/23568
- http://secunia.com/advisories/23745
- http://secunia.com/advisories/23753
- http://secunia.com/advisories/23795
- http://secunia.com/advisories/25993
- http://secunia.com/advisories/26046
- http://secunia.com/advisories/26100
- http://secunia.com/advisories/26101
- http://secunia.com/advisories/28407
- http://secunia.com/advisories/30406
- http://secunia.com/advisories/30424
- http://secunia.com/advisories/30439
- http://secunia.com/advisories/30446
- http://secunia.com/advisories/30447
- http://secunia.com/advisories/30450
- http://secunia.com/advisories/30459
- http://secunia.com/blog/6/
- http://secunia.com/secunia_research/2007-10/advisory/
- http://secunia.com/secunia_research/2007-11/advisory/
- http://secunia.com/secunia_research/2007-12/advisory/
- http://secunia.com/secunia_research/2007-13/advisory/
- http://secunia.com/secunia_research/2007-14/advisory/
- http://secunia.com/secunia_research/2007-15/advisory/
- http://secunia.com/secunia_research/2007-16/advisory/
- http://secunia.com/secunia_research/2007-17/advisory/
- http://secunia.com/secunia_research/2007-18/advisory/
- http://secunia.com/secunia_research/2007-19/advisory/
- http://secunia.com/secunia_research/2007-2/advisory/
- http://secunia.com/secunia_research/2007-20/advisory/
- http://secunia.com/secunia_research/2007-21/advisory/
- http://secunia.com/secunia_research/2007-22/advisory/
- http://secunia.com/secunia_research/2007-23/advisory/
- http://secunia.com/secunia_research/2007-24/advisory/
- http://secunia.com/secunia_research/2007-25/advisory/
- http://secunia.com/secunia_research/2007-26/advisory/
- http://secunia.com/secunia_research/2007-27/advisory/
- http://secunia.com/secunia_research/2007-28/advisory/
- http://secunia.com/secunia_research/2007-29/advisory/
- http://secunia.com/secunia_research/2007-3/advisory/
- http://secunia.com/secunia_research/2007-30/advisory/
- http://secunia.com/secunia_research/2007-31/advisory/
- http://secunia.com/secunia_research/2007-32/advisory/
- http://secunia.com/secunia_research/2007-33/advisory/
- http://secunia.com/secunia_research/2007-34/advisory/
- http://secunia.com/secunia_research/2007-4/advisory/
- http://secunia.com/secunia_research/2007-5/advisory/
- http://secunia.com/secunia_research/2007-50/advisory/
- http://secunia.com/secunia_research/2007-6/advisory/
- http://secunia.com/secunia_research/2007-7/advisory/
- http://secunia.com/secunia_research/2007-8/advisory/
- http://secunia.com/secunia_research/2007-9/advisory/
- http://www.kb.cert.org/vuls/id/292713
- http://www.securityfocus.com/archive/1/457936/100/200/threaded
- http://www.securityfocus.com/archive/1/457940/100/200/threaded
- http://www.securityfocus.com/archive/1/457965/100/200/threaded
- http://www.securityfocus.com/bid/22196
- http://www.securityfocus.com/bid/23892
- http://www.vupen.com/english/advisories/2007/0310
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31707