Surina

Soundtouch

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.23%
  • Veröffentlicht 16.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:53:52

The BPMDetect class in BPMDetect.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.

Exploit
  • EPSS 0.78%
  • Veröffentlicht 16.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:53:52

The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch.

Exploit
  • EPSS 1.38%
  • Veröffentlicht 16.09.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:53:52

The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (heap corruption from size inconsistency) or possibly have unspecified other impact, as demonstrated by SoundStretch.

Exploit
  • EPSS 1.06%
  • Veröffentlicht 20.08.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 03:39:58

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open mali...

  • EPSS 0.71%
  • Veröffentlicht 13.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:30

The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.

  • EPSS 0.71%
  • Veröffentlicht 13.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:30

The FIRFilter::evaluateFilterMulti function in FIRFilter.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.

Exploit
  • EPSS 2.41%
  • Veröffentlicht 27.07.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted wav file.

Exploit
  • EPSS 3.58%
  • Veröffentlicht 27.07.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The TDStretch::acceptNewOverlapLength function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted wav file.

Exploit
  • EPSS 3.17%
  • Veröffentlicht 27.07.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The TDStretchSSE::calcCrossCorr function in source/SoundTouch/sse_optimized.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted wav file.