First published: Mon Oct 16 2017(Updated: )
There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sound Exchange | =14.4.2 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15372 is considered to have a medium severity level due to its potential for a denial of service attack.
To mitigate CVE-2017-15372, users should upgrade to a patched version of SoX from 14.4.2 to ensure the stack-based buffer overflow vulnerability is addressed.
CVE-2017-15372 affects Sound eXchange (SoX) version 14.4.2 and specific versions of Debian GNU/Linux 7.0 and 8.0.
While CVE-2017-15372 primarily results in a denial of service, there is a risk of data loss if the audio file conversion is improperly handled during the overflow.
CVE-2017-15372 is associated with a denial of service attack, which can disrupt the functionality of the application during audio file conversion.