First published: Fri Oct 20 2023(Updated: )
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory allocation failure in `start_decoder`. In that case the function returns early, but some of the pointers in `f->comment_list` are left initialized and later `setup_free` is called on these pointers in `vorbis_deinit`. This issue may lead to code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings STB | =1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45679 is a vulnerability in the stb_vorbis library that allows a crafted file to trigger memory allocation failure and lead to uninitialized memory pointers.
CVE-2023-45679 has a severity rating of 7.3 (high).
The affected version of the stb_vorbis library is 1.22.
There is currently no patch available for CVE-2023-45679. It is recommended to update to the latest version once a patch is released.
The CWE ID for CVE-2023-45679 is CWE-415.