Filtered by vendor Sound Exchange Project
Subscribe
Total
27 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-8357 | 1 Sound Exchange Project | 1 Sound Exchange | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference. | |||||
CVE-2019-8356 | 1 Sound Exchange Project | 1 Sound Exchange | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow. | |||||
CVE-2019-8355 | 1 Sound Exchange Project | 1 Sound Exchange | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c. | |||||
CVE-2019-8354 | 3 Canonical, Debian, Sound Exchange Project | 3 Ubuntu Linux, Debian Linux, Sound Exchange | 2024-11-21 | 4.3 MEDIUM | 5.0 MEDIUM |
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow. | |||||
CVE-2019-13590 | 1 Sound Exchange Project | 1 Sound Exchange | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c. | |||||
CVE-2019-1010004 | 1 Sound Exchange Project | 1 Sound Exchange | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
SoX - Sound eXchange 14.4.2 and earlier is affected by: Out-of-bounds Read. The impact is: Denial of Service. The component is: read_samples function at xa.c:219. The attack vector is: Victim must open specially crafted .xa file. NOTE: this may overlap CVE-2017-18189. | |||||
CVE-2017-18189 | 2 Debian, Sound Exchange Project | 2 Debian Linux, Sound Exchange | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In the startread function in xa.c in Sound eXchange (SoX) through 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a denial-of-service. |