First published: Fri Jul 09 2021(Updated: )
A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sox Project Sox | =14.4.1 | |
debian/sox | <=14.4.2+git20190427-1 | 14.4.2+git20190427-1+deb10u3 14.4.2+git20190427-2+deb11u2 14.4.2+git20190427-3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3643 is a vulnerability found in sox 14.4.1 that leads to a global-buffer-overflow, allowing an attacker to input a malicious file and disclose sensitive information.
The severity of CVE-2021-3643 is critical with a score of 9.1.
CVE-2021-3643 impacts sox 14.4.1 by allowing an attacker to input a malicious file and potentially disclose sensitive information.
To fix CVE-2021-3643, update to the latest version of sox 14.4.2+git20190427-3.5.
Yes, you can find references for CVE-2021-3643 at the following links: [link1](https://sourceforge.net/p/sox/bugs/351/), [link2](https://security-tracker.debian.org/tracker/CVE-2021-3643), [link3](https://security-tracker.debian.org/tracker/CVE-2021-23210).