Radscan Network Audio System 1.9.3

CPE Details

Radscan Network Audio System 1.9.3
1.9.3
2013-10-09
16h28 +00:00
2013-10-09
16h40 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:radscan:network_audio_system:1.9.3:*:*:*:*:*:*:*

Informations

Vendor

radscan

Product

network_audio_system

Version

1.9.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2013-4256 2013-10-09 12h44 +00:00 Multiple stack-based and heap-based buffer overflows in Network Audio System (NAS) 1.9.3 allow local users to cause a denial of service (crash) or possibly execute arbitrary code via the (1) display command argument to the ProcessCommandLine function in server/os/utils.c; (2) ResetHosts function in server/os/access.c; (3) open_unix_socket, (4) open_isc_local, (5) open_xsight_local, (6) open_att_local, or (7) open_att_svr4_local function in server/os/connection.c; the (8) AUDIOHOST environment variable to the CreateWellKnownSockets or (9) AmoebaTCPConnectorThread function in server/os/connection.c; or (10) unspecified vectors related to logging in the osLogMsg function in server/os/aulog.c.
4.6
CVE-2013-4258 2013-10-09 12h44 +00:00 Format string vulnerability in the osLogMsg function in server/os/aulog.c in Network Audio System (NAS) 1.9.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in unspecified vectors, related to syslog.
7.5