First published: Thu Jun 24 2021(Updated: )
A vulnerability was found in SoX, where a heap based overflow was found in formats_i.c:376, function lsx_read_w_buf. References: <a href="https://sourceforge.net/p/sox/bugs/352/">https://sourceforge.net/p/sox/bugs/352/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SoX (Sound eXchange) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1975671 has been classified as a heap-based overflow vulnerability which can lead to potential code execution.
To fix REDHAT-BUG-1975671, update SoX to the latest available version that addresses the heap overflow vulnerability.
All versions of SoX prior to the fix that addresses the vulnerability in formats_i.c are potentially affected by REDHAT-BUG-1975671.
The vulnerability in REDHAT-BUG-1975671 is found in the lsx_read_w_buf function located in formats_i.c.
Yes, REDHAT-BUG-1975671 may be exploited by remote attackers if they can send crafted input files to the SoX application.