CVE-2007-0018

Description

Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x.

Category

9.3
CVSS
Severity: Critical
CVSS 2.0 •
EPSS 74.97% Top 5%
Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://secunia.com/advisories/23546 third party advisory
http://www.securityfocus.com/bid/23892 vdb entry
http://secunia.com/secunia_research/2007-7/advisory/ vendor advisory
http://secunia.com/advisories/23535 third party advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/31707 vdb entry
http://secunia.com/secunia_research/2007-12/advisory/ vendor advisory
http://secunia.com/advisories/23562 third party advisory
http://secunia.com/secunia_research/2007-27/advisory/ vendor advisory
http://secunia.com/advisories/23536 third party advisory
http://secunia.com/advisories/30459 third party advisory
http://secunia.com/advisories/30406 third party advisory
http://secunia.com/secunia_research/2007-29/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-24/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-8/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-9/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-13/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-20/advisory/ vendor advisory
http://secunia.com/advisories/23553 third party advisory vendor advisory
http://secunia.com/advisories/23551 third party advisory vendor advisory
http://secunia.com/advisories/23485 third party advisory vendor advisory
http://secunia.com/secunia_research/2007-50/advisory/
http://secunia.com/advisories/23550 third party advisory
http://secunia.com/secunia_research/2007-16/advisory/ vendor advisory
http://secunia.com/advisories/30447 third party advisory
http://secunia.com/secunia_research/2007-28/advisory/ vendor advisory
http://secunia.com/advisories/23541 third party advisory
http://secunia.com/advisories/26046 third party advisory
http://secunia.com/advisories/23534 third party advisory vendor advisory
http://secunia.com/secunia_research/2007-15/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-10/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-4/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-18/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-23/advisory/ vendor advisory
http://secunia.com/advisories/23516 third party advisory vendor advisory
http://secunia.com/secunia_research/2007-14/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-19/advisory/ vendor advisory
http://secunia.com/advisories/25993 third party advisory
http://secunia.com/secunia_research/2007-17/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-31/advisory/ vendor advisory
http://secunia.com/advisories/23495 third party advisory vendor advisory
http://secunia.com/secunia_research/2007-32/advisory/ vendor advisory
http://secunia.com/advisories/23558 third party advisory
http://secunia.com/secunia_research/2007-33/advisory/ vendor advisory
http://secunia.com/advisories/23544 third party advisory
http://www.securityfocus.com/archive/1/457936/100/200/threaded mailing list
http://secunia.com/advisories/23530 third party advisory vendor advisory
http://secunia.com/advisories/23795 third party advisory
http://secunia.com/secunia_research/2007-3/advisory/ vendor advisory
http://secunia.com/advisories/23543 third party advisory vendor advisory
http://secunia.com/advisories/23552 third party advisory vendor advisory
http://secunia.com/blog/6/ vendor advisory
http://secunia.com/advisories/23475 third party advisory vendor advisory
http://secunia.com/advisories/23560 third party advisory
http://secunia.com/advisories/30439 third party advisory
http://www.securityfocus.com/archive/1/457940/100/200/threaded mailing list
http://secunia.com/secunia_research/2007-25/advisory/ vendor advisory
http://secunia.com/advisories/26100 third party advisory
http://secunia.com/secunia_research/2007-34/advisory/ vendor advisory
http://www.securityfocus.com/archive/1/457965/100/200/threaded mailing list
http://secunia.com/secunia_research/2007-21/advisory/ vendor advisory
http://secunia.com/advisories/23548 third party advisory
http://secunia.com/advisories/30446 third party advisory
http://secunia.com/advisories/30424 third party advisory
http://secunia.com/advisories/23561 third party advisory
http://secunia.com/advisories/23557 third party advisory vendor advisory
http://secunia.com/secunia_research/2007-6/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-30/advisory/ vendor advisory
http://secunia.com/advisories/23745 third party advisory
http://secunia.com/advisories/28407 third party advisory
http://secunia.com/advisories/23493 third party advisory vendor advisory
http://secunia.com/advisories/23511 third party advisory vendor advisory
http://www.vupen.com/english/advisories/2007/0310 vdb entry
http://secunia.com/advisories/23565 third party advisory
http://secunia.com/secunia_research/2007-5/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-11/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-22/advisory/ vendor advisory
http://secunia.com/secunia_research/2007-26/advisory/ vendor advisory
http://secunia.com/advisories/22922 third party advisory
http://secunia.com/advisories/30450 third party advisory
http://secunia.com/secunia_research/2007-2/advisory/ vendor advisory
http://secunia.com/advisories/23568 third party advisory vendor advisory
http://secunia.com/advisories/23532 third party advisory vendor advisory
http://secunia.com/advisories/26101 third party advisory
http://secunia.com/advisories/23753 third party advisory
http://secunia.com/advisories/23542 third party advisory
http://www.kb.cert.org/vuls/id/292713 third party advisory us government resource
http://secunia.com/advisories/23554 third party advisory
http://www.securityfocus.com/bid/22196 vdb entry

Frequently Asked Questions

What is the severity of CVE-2007-0018?
CVE-2007-0018 has been scored as a critical severity vulnerability.
How to fix CVE-2007-0018?
To fix CVE-2007-0018, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2007-0018 being actively exploited in the wild?
It is possible that CVE-2007-0018 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~75% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.