Sound Exchange Project

Sound Exchange

26 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 02.05.2022 19:15:08
  • Zuletzt bearbeitet 27.06.2025 18:51:27

A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information.

Exploit
  • EPSS 0.24%
  • Veröffentlicht 15.07.2019 02:15:10
  • Zuletzt bearbeitet 21.11.2024 04:17:54

SoX - Sound eXchange 14.4.2 and earlier is affected by: Out-of-bounds Read. The impact is: Denial of Service. The component is: read_samples function at xa.c:219. The attack vector is: Victim must open specially crafted .xa file. NOTE: this may overl...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 14.07.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:25:17

An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, i...

  • EPSS 0.44%
  • Veröffentlicht 15.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:45

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.

Exploit
  • EPSS 0.5%
  • Veröffentlicht 15.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:44

An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.

  • EPSS 0.5%
  • Veröffentlicht 15.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:44

An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buff...

  • EPSS 0.65%
  • Veröffentlicht 15.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:44

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.

Exploit
  • EPSS 1.46%
  • Veröffentlicht 15.02.2018 10:29:00
  • Zuletzt bearbeitet 21.11.2024 03:19:31

In the startread function in xa.c in Sound eXchange (SoX) through 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a denial-of-service.

  • EPSS 0.6%
  • Veröffentlicht 19.10.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In lsx_aiffstartread in aiff.c in Sound eXchange (SoX) 14.4.2, there is a Use-After-Free vulnerability triggered by supplying a malformed AIFF file.

Exploit
  • EPSS 0.54%
  • Veröffentlicht 16.10.2017 04:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.