First published: Fri Oct 20 2023(Updated: )
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of buffer write in `start_decoder` because at maximum `m->submaps` can be 16 but `submap_floor` and `submap_residue` are declared as arrays of 15 elements. This issue may lead to code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings STB | =1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-45678.
The severity of CVE-2023-45678 is high with a CVSS score of 7.8.
The affected software is stb_vorbis version 1.22.
The root cause of CVE-2023-45678 is an off-by-one heap buffer write in the start_decoder function of stb_vorbis.c.
To fix CVE-2023-45678, update to a version of stb_vorbis that addresses the buffer write issue.