Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-33064

Опубликовано: 18 июл. 2023
Источник: debian
EPSS Низкий

Описание

An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts.

Примечания

  • Non issue in libsndfile, was also filed as bug #1051890

  • https://github.com/libsndfile/libsndfile/issues/832

  • Upstream disputes issue as possible false-positive:

  • https://github.com/libsndfile/libsndfile/issues/832#issuecomment-1702253852 ff

EPSS

Процентиль: 8%
0.0003
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts.

CVSS3: 8.4
redhat
больше 2 лет назад

An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts.

CVSS3: 7.8
nvd
больше 2 лет назад

An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts.

CVSS3: 7.8
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 7.8
github
больше 2 лет назад

An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts.

EPSS

Процентиль: 8%
0.0003
Низкий