CVE-2013-4256

NameCVE-2013-4256
DescriptionMultiple stack-based and heap-based buffer overflows in Network Audio System (NAS) 1.9.3 allow local users to cause a denial of service (crash) or possibly execute arbitrary code via the (1) display command argument to the ProcessCommandLine function in server/os/utils.c; (2) ResetHosts function in server/os/access.c; (3) open_unix_socket, (4) open_isc_local, (5) open_xsight_local, (6) open_att_local, or (7) open_att_svr4_local function in server/os/connection.c; the (8) AUDIOHOST environment variable to the CreateWellKnownSockets or (9) AmoebaTCPConnectorThread function in server/os/connection.c; or (10) unspecified vectors related to logging in the osLogMsg function in server/os/aulog.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2771-1
Debian Bugs720287

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nas (PTS)bookworm, bullseye1.9.4-7fixed
sid, trixie1.9.4-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nassourcesqueeze1.9.2-4squeeze1DSA-2771-1
nassourcewheezy1.9.3-5wheezy1DSA-2771-1
nassource(unstable)1.9.3-6720287

Search for package or bug name: Reporting problems