Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sound exchange project sound exchange vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2014-8145
Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and previous versions allow remote malicious users to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
Sound Exchange Project Sound Exchange
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Oracle Solaris 11.2
605
VMScore
CVE-2021-40426
A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerabi...
Libsox Project Libsox 14.4.2
445
VMScore
CVE-2017-18189
In the startread function in xa.c in Sound eXchange (SoX) up to and including 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote malicious user to cause a denial-of-service.
Sound Exchange Project Sound Exchange
Debian Debian Linux 8.0
435
VMScore
CVE-2017-11358
The read_samples function in hcom.c in Sound eXchange (SoX) 14.4.2 allows remote malicious users to cause a denial of service (invalid memory read and application crash) via a crafted hcom file.
Sound Exchange Project Sound Exchange 14.4.2
Debian Debian Linux 8.0
Debian Debian Linux 7.0
1 EDB exploit
435
VMScore
CVE-2017-11359
The wavwritehdr function in wav.c in Sound eXchange (SoX) 14.4.2 allows remote malicious users to cause a denial of service (divide-by-zero error and application crash) via a crafted snd file, during conversion to a wav file.
Sound Exchange Project Sound Exchange 14.4.2
Debian Debian Linux 7.0
Debian Debian Linux 8.0
1 EDB exploit
435
VMScore
CVE-2017-11332
The startread function in wav.c in Sound eXchange (SoX) 14.4.2 allows remote malicious users to cause a denial of service (divide-by-zero error and application crash) via a crafted wav file.
Sound Exchange Project Sound Exchange 14.4.2
Debian Debian Linux 7.0
Debian Debian Linux 8.0
1 EDB exploit
383
VMScore
CVE-2019-1010004
SoX - Sound eXchange 14.4.2 and previous versions is affected by: Out-of-bounds Read. The impact is: Denial of Service. The component is: read_samples function at xa.c:219. The attack vector is: Victim must open specially crafted .xa file. NOTE: this may overlap CVE-2017-18189.
Sound Exchange Project Sound Exchange
383
VMScore
CVE-2019-13590
An issue exists in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that i...
Sound Exchange Project Sound Exchange 14.4.2
383
VMScore
CVE-2019-8355
An issue exists in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix...
Sound Exchange Project Sound Exchange 14.4.2
383
VMScore
CVE-2019-8354
An issue exists in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
Sound Exchange Project Sound Exchange 14.4.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »