First published: Mon Oct 02 2023(Updated: )
Buffer Overflow vulnerability in Vorbis-tools v.1.4.2 allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xiph Vorbis-tools | =1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43361 is a buffer overflow vulnerability in Vorbis-tools v.1.4.2 that allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files.
The severity of CVE-2023-43361 vulnerability is high with a CVSS score of 7.8.
Vorbis-tools v.1.4.2 is affected by CVE-2023-43361.
A local attacker can exploit CVE-2023-43361 by executing arbitrary code while converting wav files to ogg files.
Yes, you can find references for CVE-2023-43361 at the following URLs: [GitHub - Xiph/Vorbis](https://github.com/xiph/vorbis), [GitHub - Xiph/Vorbis-tools](https://github.com/xiph/vorbis-tools), [GitHub - Xiph/Vorbis-tools Issue #41](https://github.com/xiph/vorbis-tools/issues/41).