CVE-2018-1000223

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
References
Link Resource
https://gitlab.com/soundtouch/soundtouch/issues/6 Exploit Issue Tracking Third Party Advisory
https://gitlab.com/soundtouch/soundtouch/issues/6 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:surina:soundtouch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () https://gitlab.com/soundtouch/soundtouch/issues/6 - Exploit, Issue Tracking, Third Party Advisory () https://gitlab.com/soundtouch/soundtouch/issues/6 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2018-08-20 20:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000223

Mitre link : CVE-2018-1000223

CVE.ORG link : CVE-2018-1000223


JSON object : View

Products Affected

surina

  • soundtouch
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer