SB2023032209 - Multiple vulnerabilities in SoX
Published: March 22, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2021-3643)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the lsx_adpcm_init() function in libsox. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.
2) Division by zero (CVE-ID: CVE-2021-33844)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a divide by zero error within the startread() function in wav.c. A remote attacker can trick the victim to open a specially crafted file and crash the application.3) Division by zero (CVE-ID: CVE-2021-23210)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a divide by zero error within the read_samples() function in voc.c. A remote attacker can trick the victim to open a specially crafted file and crash the application.
4) Heap-based buffer overflow (CVE-ID: CVE-2021-23172)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
5) Heap-based buffer overflow (CVE-ID: CVE-2021-23159)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the lsx_read_w_buf() function in formats_i.c. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and crash the application.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1980626
- https://bugzilla.redhat.com/show_bug.cgi?id=1975664
- https://security.archlinux.org/CVE-2021-33844
- https://access.redhat.com/security/cve/CVE-2021-33844
- https://sourceforge.net/p/sox/bugs/349/
- https://sourceforge.net/p/sox/bugs/351/
- https://security.archlinux.org/CVE-2021-23210
- https://bugzilla.redhat.com/show_bug.cgi?id=1975670
- https://access.redhat.com/security/cve/CVE-2021-23210
- https://bugzilla.redhat.com/show_bug.cgi?id=1975666
- https://sourceforge.net/p/sox/bugs/350/
- https://access.redhat.com/security/cve/CVE-2021-23172
- https://security.archlinux.org/CVE-2021-23172
- https://access.redhat.com/security/cve/CVE-2021-23159
- https://sourceforge.net/p/sox/bugs/352/
- https://security.archlinux.org/CVE-2021-23159
- https://bugzilla.redhat.com/show_bug.cgi?id=1975671