Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2019-8355
HistoryFeb 15, 2019 - 11:29 p.m.

CVE-2019-8355

2019-02-1523:29:00
Debian Security Bug Tracker
security-tracker.debian.org
15

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.8%

An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.

OSVersionArchitecturePackageVersionFilename
Debian12allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb
Debian11allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb
Debian999allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb
Debian13allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.8%