Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://secunia.com/advisories/22922 cve-icon cve-icon
http://secunia.com/advisories/23475 cve-icon cve-icon
http://secunia.com/advisories/23485 cve-icon cve-icon
http://secunia.com/advisories/23493 cve-icon cve-icon
http://secunia.com/advisories/23495 cve-icon cve-icon
http://secunia.com/advisories/23511 cve-icon cve-icon
http://secunia.com/advisories/23516 cve-icon cve-icon
http://secunia.com/advisories/23530 cve-icon cve-icon
http://secunia.com/advisories/23532 cve-icon cve-icon
http://secunia.com/advisories/23534 cve-icon cve-icon
http://secunia.com/advisories/23535 cve-icon cve-icon
http://secunia.com/advisories/23536 cve-icon cve-icon
http://secunia.com/advisories/23541 cve-icon cve-icon
http://secunia.com/advisories/23542 cve-icon cve-icon
http://secunia.com/advisories/23543 cve-icon cve-icon
http://secunia.com/advisories/23544 cve-icon cve-icon
http://secunia.com/advisories/23546 cve-icon cve-icon
http://secunia.com/advisories/23548 cve-icon cve-icon
http://secunia.com/advisories/23550 cve-icon cve-icon
http://secunia.com/advisories/23551 cve-icon cve-icon
http://secunia.com/advisories/23552 cve-icon cve-icon
http://secunia.com/advisories/23553 cve-icon cve-icon
http://secunia.com/advisories/23554 cve-icon cve-icon
http://secunia.com/advisories/23557 cve-icon cve-icon
http://secunia.com/advisories/23558 cve-icon cve-icon
http://secunia.com/advisories/23560 cve-icon cve-icon
http://secunia.com/advisories/23561 cve-icon cve-icon
http://secunia.com/advisories/23562 cve-icon cve-icon
http://secunia.com/advisories/23565 cve-icon cve-icon
http://secunia.com/advisories/23568 cve-icon cve-icon
http://secunia.com/advisories/23745 cve-icon cve-icon
http://secunia.com/advisories/23753 cve-icon cve-icon
http://secunia.com/advisories/23795 cve-icon cve-icon
http://secunia.com/advisories/25993 cve-icon cve-icon
http://secunia.com/advisories/26046 cve-icon cve-icon
http://secunia.com/advisories/26100 cve-icon cve-icon
http://secunia.com/advisories/26101 cve-icon cve-icon
http://secunia.com/advisories/28407 cve-icon cve-icon
http://secunia.com/advisories/30406 cve-icon cve-icon
http://secunia.com/advisories/30424 cve-icon cve-icon
http://secunia.com/advisories/30439 cve-icon cve-icon
http://secunia.com/advisories/30446 cve-icon cve-icon
http://secunia.com/advisories/30447 cve-icon cve-icon
http://secunia.com/advisories/30450 cve-icon cve-icon
http://secunia.com/advisories/30459 cve-icon cve-icon
http://secunia.com/blog/6/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-10/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-11/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-12/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-13/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-14/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-15/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-16/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-17/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-18/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-19/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-2/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-20/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-21/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-22/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-23/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-24/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-25/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-26/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-27/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-28/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-29/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-3/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-30/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-31/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-32/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-33/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-34/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-4/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-5/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-50/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-6/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-7/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-8/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2007-9/advisory/ cve-icon cve-icon
http://www.kb.cert.org/vuls/id/292713 cve-icon cve-icon
http://www.securityfocus.com/archive/1/457936/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/457940/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/457965/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/22196 cve-icon cve-icon
http://www.securityfocus.com/bid/23892 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0310 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/31707 cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: flexera

Published:

Updated: 2024-08-07T12:03:36.587Z

Reserved: 2007-01-02T00:00:00

Link: CVE-2007-0018

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-01-24T21:28:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-0018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.