Vulnerability Note VU#451096

Oliver Debon Flash plug-in vulnerable to buffer overflow processing incorrectly formatted sound file

Original Release date: 17 May 2001 | Last revised: 20 Jun 2001


When passed an incorrectly formatted sound file, the Oliver Debon (freeware) Flash plug-in is reportedly vulnerable to a buffer overflow.


The DefineSound tag in a sound file passes data to a Flash plug-in. If this tag specifies fewer samples than are actually present in the data, a buffer overflow may occur in the plug-in produced by Oliver Debon.


The attacker may crash browser or execute commands as the user running the Flash plug-in.


Because the software is unsupported and no patches are available, CERT/CC is unaware of any corrective measures.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MacromediaNot Affected-15 May 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Neal Krawetz authored the original description of the vulnerability.

This document was last modified by Tim Shimeall

Other Information

  • CVE IDs: CAN-2001-0127
  • Date Public: 05 Jan 2001
  • Date First Published: 17 May 2001
  • Date Last Updated: 20 Jun 2001
  • Severity Metric: 0.08
  • Document Revision: 10


If you have feedback, comments, or additional information about this vulnerability, please send us email.