A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References
Configurations
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/02/03/3 - | |
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html - | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 - Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5356 - |
Information
Published : 2022-04-14 20:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40426
Mitre link : CVE-2021-40426
CVE.ORG link : CVE-2021-40426
JSON object : View
Products Affected
libsox_project
- libsox