Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sound_exchange
(Sound_exchange_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 16 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-02-15 | CVE-2019-8357 | An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference. | Sound_exchange | 5.5 | ||
2019-02-15 | CVE-2019-8356 | An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow. | Sound_exchange | 5.5 | ||
2019-02-15 | CVE-2019-8355 | An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c. | Sound_exchange | 5.5 | ||
2017-07-31 | CVE-2017-11359 | The wavwritehdr function in wav.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted snd file, during conversion to a wav file. | Debian_linux, Sound_exchange | 5.5 | ||
2017-07-31 | CVE-2017-11332 | The startread function in wav.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted wav file. | Debian_linux, Sound_exchange | 5.5 | ||
2014-12-31 | CVE-2014-8145 | Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function. | Debian_linux, Solaris, Sound_exchange | N/A |