Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation34 reference(s) from NVD