An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html | |
https://sourceforge.net/p/sox/bugs/325/ | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html | |
https://sourceforge.net/p/sox/bugs/325/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html - | |
References | () https://sourceforge.net/p/sox/bugs/325/ - Exploit, Third Party Advisory |
Information
Published : 2019-07-14 16:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13590
Mitre link : CVE-2019-13590
CVE.ORG link : CVE-2019-13590
JSON object : View
Products Affected
sound_exchange_project
- sound_exchange