Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15372

Опубликовано: 16 окт. 2017
Источник: debian

Описание

There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
soxfixed14.4.2-2package
soxfixed14.4.1-5+deb9u2stretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1500553

  • https://github.com/mansr/sox/commit/001c337552912d286ba68086ac378f6fdc1e8b50

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

CVSS3: 3.3
redhat
больше 8 лет назад

There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

CVSS3: 5.5
nvd
больше 8 лет назад

There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.

CVSS3: 5.5
github
больше 3 лет назад

There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.