First published: Thu Jun 24 2021(Updated: )
A vulnerability was found in SoX, where a heap based overflow was found in formats_i.c:376, function lsx_read_w_buf. References: <a href="https://sourceforge.net/p/sox/bugs/352/">https://sourceforge.net/p/sox/bugs/352/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sox | <=14.4.2+git20190427-1 | 14.4.2+git20190427-1+deb10u3 14.4.2+git20190427-2+deb11u2 14.4.2+git20190427-3.5 |
Sox Project Sox | =14.4.2-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23159 is a vulnerability in SoX where a heap-buffer-overflow occurs in the lsx_read_w_buf() function in the formats_i.c file, which can lead to an application crash.
CVE-2021-23159 has a severity rating of 5.5 (high).
CVE-2021-23159 can be exploited by using a crafted file that triggers the heap-buffer-overflow in SoX's lsx_read_w_buf() function.
SoX versions 14.4.2+git20190427-1+deb10u3, 14.4.2+git20190427-2+deb11u2, and 14.4.2+git20190427-3.5 are affected by CVE-2021-23159.
You can find more information about CVE-2021-23159 at the following references: [Link 1](https://security-tracker.debian.org/tracker/CVE-2021-23159), [Link 2](https://sourceforge.net/p/sox/bugs/352/), [Link 3](https://bugzilla.redhat.com/show_bug.cgi?id=1975671).