Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-23172

Опубликовано: 25 авг. 2022
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
soxfixed14.4.2+git20190427-3.2package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1975666

  • https://sourceforge.net/p/sox/bugs/350/

  • https://www.openwall.com/lists/oss-security/2023/02/03/3

EPSS

Процентиль: 11%
0.00037
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 3 лет назад

A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash.

CVSS3: 3.3
redhat
почти 5 лет назад

A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash.

CVSS3: 5.5
nvd
больше 3 лет назад

A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash.

CVSS3: 5.5
github
больше 3 лет назад

A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash.

CVSS3: 5.5
fstec
почти 5 лет назад

Уязвимость функции startread() компонента hcom.c программы обработки звука SoX, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 11%
0.00037
Низкий