U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2007-0018 Detail

Current Description

Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x.


View Analysis Description

Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://secunia.com/advisories/22922
http://secunia.com/advisories/22922
http://secunia.com/advisories/23475 Vendor Advisory 
http://secunia.com/advisories/23475 Vendor Advisory 
http://secunia.com/advisories/23485 Vendor Advisory 
http://secunia.com/advisories/23485 Vendor Advisory 
http://secunia.com/advisories/23493 Vendor Advisory 
http://secunia.com/advisories/23493 Vendor Advisory 
http://secunia.com/advisories/23495 Vendor Advisory 
http://secunia.com/advisories/23495 Vendor Advisory 
http://secunia.com/advisories/23511 Vendor Advisory 
http://secunia.com/advisories/23511 Vendor Advisory 
http://secunia.com/advisories/23516 Vendor Advisory 
http://secunia.com/advisories/23516 Vendor Advisory 
http://secunia.com/advisories/23530 Vendor Advisory 
http://secunia.com/advisories/23530 Vendor Advisory 
http://secunia.com/advisories/23532 Vendor Advisory 
http://secunia.com/advisories/23532 Vendor Advisory 
http://secunia.com/advisories/23534 Vendor Advisory 
http://secunia.com/advisories/23534 Vendor Advisory 
http://secunia.com/advisories/23535
http://secunia.com/advisories/23535
http://secunia.com/advisories/23536
http://secunia.com/advisories/23536
http://secunia.com/advisories/23541
http://secunia.com/advisories/23541
http://secunia.com/advisories/23542
http://secunia.com/advisories/23542
http://secunia.com/advisories/23543 Vendor Advisory 
http://secunia.com/advisories/23543 Vendor Advisory 
http://secunia.com/advisories/23544
http://secunia.com/advisories/23544
http://secunia.com/advisories/23546
http://secunia.com/advisories/23546
http://secunia.com/advisories/23548
http://secunia.com/advisories/23548
http://secunia.com/advisories/23550
http://secunia.com/advisories/23550
http://secunia.com/advisories/23551 Vendor Advisory 
http://secunia.com/advisories/23551 Vendor Advisory 
http://secunia.com/advisories/23552 Vendor Advisory 
http://secunia.com/advisories/23552 Vendor Advisory 
http://secunia.com/advisories/23553 Vendor Advisory 
http://secunia.com/advisories/23553 Vendor Advisory 
http://secunia.com/advisories/23554
http://secunia.com/advisories/23554
http://secunia.com/advisories/23557 Vendor Advisory 
http://secunia.com/advisories/23557 Vendor Advisory 
http://secunia.com/advisories/23558
http://secunia.com/advisories/23558
http://secunia.com/advisories/23560
http://secunia.com/advisories/23560
http://secunia.com/advisories/23561
http://secunia.com/advisories/23561
http://secunia.com/advisories/23562
http://secunia.com/advisories/23562
http://secunia.com/advisories/23565
http://secunia.com/advisories/23565
http://secunia.com/advisories/23568 Vendor Advisory 
http://secunia.com/advisories/23568 Vendor Advisory 
http://secunia.com/advisories/23745
http://secunia.com/advisories/23745
http://secunia.com/advisories/23753
http://secunia.com/advisories/23753
http://secunia.com/advisories/23795
http://secunia.com/advisories/23795
http://secunia.com/advisories/25993
http://secunia.com/advisories/25993
http://secunia.com/advisories/26046
http://secunia.com/advisories/26046
http://secunia.com/advisories/26100
http://secunia.com/advisories/26100
http://secunia.com/advisories/26101
http://secunia.com/advisories/26101
http://secunia.com/advisories/28407
http://secunia.com/advisories/28407
http://secunia.com/advisories/30406
http://secunia.com/advisories/30406
http://secunia.com/advisories/30424
http://secunia.com/advisories/30424
http://secunia.com/advisories/30439
http://secunia.com/advisories/30439
http://secunia.com/advisories/30446
http://secunia.com/advisories/30446
http://secunia.com/advisories/30447
http://secunia.com/advisories/30447
http://secunia.com/advisories/30450
http://secunia.com/advisories/30450
http://secunia.com/advisories/30459
http://secunia.com/advisories/30459
http://secunia.com/blog/6/ Vendor Advisory 
http://secunia.com/blog/6/ Vendor Advisory 
http://secunia.com/secunia_research/2007-10/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-10/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-11/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-11/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-12/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-12/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-13/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-13/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-14/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-14/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-15/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-15/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-16/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-16/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-17/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-17/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-18/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-18/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-19/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-19/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-2/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-2/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-20/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-20/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-21/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-21/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-22/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-22/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-23/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-23/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-24/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-24/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-25/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-25/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-26/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-26/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-27/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-27/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-28/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-28/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-29/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-29/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-3/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-3/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-30/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-30/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-31/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-31/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-32/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-32/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-33/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-33/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-34/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-34/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-4/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-4/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-5/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-5/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-50/advisory/
http://secunia.com/secunia_research/2007-50/advisory/
http://secunia.com/secunia_research/2007-6/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-6/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-7/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-7/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-8/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-8/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-9/advisory/ Vendor Advisory 
http://secunia.com/secunia_research/2007-9/advisory/ Vendor Advisory 
http://www.kb.cert.org/vuls/id/292713 US Government Resource 
http://www.kb.cert.org/vuls/id/292713 US Government Resource 
http://www.securityfocus.com/archive/1/457936/100/200/threaded
http://www.securityfocus.com/archive/1/457936/100/200/threaded
http://www.securityfocus.com/archive/1/457940/100/200/threaded
http://www.securityfocus.com/archive/1/457940/100/200/threaded
http://www.securityfocus.com/archive/1/457965/100/200/threaded
http://www.securityfocus.com/archive/1/457965/100/200/threaded
http://www.securityfocus.com/bid/22196
http://www.securityfocus.com/bid/22196
http://www.securityfocus.com/bid/23892
http://www.securityfocus.com/bid/23892
http://www.vupen.com/english/advisories/2007/0310
http://www.vupen.com/english/advisories/2007/0310
https://exchange.xforce.ibmcloud.com/vulnerabilities/31707
https://exchange.xforce.ibmcloud.com/vulnerabilities/31707

Weakness Enumeration

CWE-ID CWE Name Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

5 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2007-0018
NVD Published Date:
01/24/2007
NVD Last Modified:
11/20/2024
Source:
Flexera Software LLC