Description
A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References (4)
Core 4
Core References
Mailing List mailing-list
http://www.openwall.com/lists/oss-security/2023/02/03/3
Exploit, Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5356
Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html
Scores
CVSS v3
8.8
EPSS
0.0054
EPSS Percentile
67.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (1)
sound_exchange_project/sound_exchange
14.4.2
Published
Apr 14, 2022
Tracked Since
Feb 18, 2026