First published: Fri Oct 20 2023(Updated: )
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds read in `DECODE` macro when `var` is negative. As it can be seen in the definition of `DECODE_RAW` a negative `var` is a valid value. This issue may be used to leak internal memory allocation information.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings STB | =1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45682 is a vulnerability in the stb_vorbis library that allows for a wild address read in the vorbis_decode_packet_rest function.
CVE-2023-45682 affects version 1.22 of the stb_vorbis library.
CVE-2023-45682 has a severity value of 7.1, which is considered high.
CVE-2023-45682 can be exploited by crafting a file that triggers an out-of-bounds read in the DECODE macro when var is negative.
Yes, the fix for CVE-2023-45682 can be found in the stb_vorbis.c file at lines 1717-1729 and 1754-1756 in the stb_vorbis library's GitHub repository.