Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sound exchange project sound exchange vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2019-1010004
SoX - Sound eXchange 14.4.2 and previous versions is affected by: Out-of-bounds Read. The impact is: Denial of Service. The component is: read_samples function at xa.c:219. The attack vector is: Victim must open specially crafted .xa file. NOTE: this may overlap CVE-2017-18189.
Sound Exchange Project Sound Exchange
5
CVSSv3
CVE-2019-8354
An issue exists in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
Sound Exchange Project Sound Exchange 14.4.2
5.5
CVSSv3
CVE-2019-8355
An issue exists in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix...
Sound Exchange Project Sound Exchange 14.4.2
5.5
CVSSv3
CVE-2019-8356
An issue exists in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
Sound Exchange Project Sound Exchange 14.4.2
5.5
CVSSv3
CVE-2019-8357
An issue exists in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
Sound Exchange Project Sound Exchange 14.4.2
5.5
CVSSv3
CVE-2019-13590
An issue exists in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that i...
Sound Exchange Project Sound Exchange 14.4.2
7.5
CVSSv3
CVE-2017-18189
In the startread function in xa.c in Sound eXchange (SoX) up to and including 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote malicious user to cause a denial-of-service.
Sound Exchange Project Sound Exchange
Debian Debian Linux 8.0
5.5
CVSSv3
CVE-2017-15642
In lsx_aiffstartread in aiff.c in Sound eXchange (SoX) 14.4.2, there is a Use-After-Free vulnerability triggered by supplying a malformed AIFF file.
Sound Exchange Project Sound Exchange 14.4.2
Debian Debian Linux 8.0
Debian Debian Linux 7.0
5.5
CVSSv3
CVE-2017-15370
There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.
Sound Exchange Project Sound Exchange 14.4.2
Debian Debian Linux 7.0
Debian Debian Linux 8.0
5.5
CVSSv3
CVE-2017-15371
There is a reachable assertion abort in the function sox_append_comment() in formats.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.
Sound Exchange Project Sound Exchange 14.4.2
Debian Debian Linux 7.0
Debian Debian Linux 8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »