First published: Fri Oct 20 2023(Updated: )
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[i] = get8_packet(f);`. The root cause is an integer overflow in `setup_malloc`. A sufficiently large value in the variable `sz` overflows with `sz+7` in and the negative value passes the maximum available memory buffer check. This issue may lead to code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings STB | =1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-45676.
The severity of CVE-2023-45676 is high with a severity value of 7.3.
The software affected by CVE-2023-45676 is stb_vorbis version 1.22.
The root cause of CVE-2023-45676 is an integer overflow in the `setup_malloc` function.
To fix CVE-2023-45676, it is recommended to update to a patched version of stb_vorbis.