First published: Fri Oct 20 2023(Updated: )
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[len] = (char)'\0';`. The root cause is that if `len` read in `start_decoder` is a negative number and `setup_malloc` successfully allocates memory in that case, but memory write is done with a negative index `len`. Similarly if len is INT_MAX the integer overflow len+1 happens in `f->vendor = (char*)setup_malloc(f, sizeof(char) * (len+1));` and `f->comment_list[i] = (char*)setup_malloc(f, sizeof(char) * (len+1));`. This issue may lead to code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings STB | =1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45677 is a vulnerability in stb_vorbis library that allows for a heap buffer out of bounds write in start_decoder function.
The severity of CVE-2023-45677 is high with a CVSS score of 7.3.
CVE-2023-45677 affects the stb_vorbis library version 1.22.
To fix the CVE-2023-45677 vulnerability, it is recommended to update to the latest version of the stb_vorbis library.
More information about CVE-2023-45677 can be found in the following references: [link1], [link2], [link3].