Snack: User-assisted execution of arbitrary code A buffer overflow in Snack could result in execution of arbitrary code or Denial of Service. snack 2013-09-11 2013-09-11 446822 remote 2.2.10-r5 2.2.10-r5

Snack is a sound toolkit for creating multi-platform audio applications with scripting languages.

The GetWavHeader() function in jkSoundFile.c does not have boundary checks when parsing format sub-chunks or unknown sub-chunks.

A remote attacker could entice a user to open a specially crafted WAV file with an application using Snack, possibly resulting in execution of arbitrary code or a Denial of Service condition.

There is no known workaround at this time.

All Snack users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-tcltk/snack-2.2.10-r5"
CVE-2012-6303 ackle creffett