7.5
CVSSv2

CVE-2014-8145

Published: 31/12/2014 Updated: 01/03/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and previous versions allow remote malicious users to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sound exchange project sound exchange

debian debian linux 7.0

debian debian linux 8.0

oracle solaris 11.2

Vendor Advisories

Debian Bug report logs - #773720 sox: CVE-2014-8145 Package: src:sox; Maintainer for src:sox is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 22 Dec 2014 15:57:01 UTC Severity: grave Tags: security, upstream Found in versions sox/ ...
Michele Spagnuolo of the Google Security Team dicovered two heap-based buffer overflows in SoX, the Swiss Army knife of sound processing programs A specially crafted wav file could cause an application using SoX to crash or, possibly, execute arbitrary code For the stable distribution (wheezy), these problems have been fixed in version 1440-3+d ...
It was discovered that SoX did not correctly process NIST Sphere and WAV audio files By tricking a victim into processing a specially crafted NIST Sphere or WAV audio file, a remote attacker could possibly use this flaw to execute arbitrary code with the privileges of the user running SoX ...