We found results for “”
CVE-2023-45677
Good to know:
Date: October 20, 2023
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[len] = (char)'\0';`. The root cause is that if `len` read in `start_decoder` is a negative number and `setup_malloc` successfully allocates memory in that case, but memory write is done with a negative index `len`. Similarly if len is INT_MAX the integer overflow len+1 happens in `f->vendor = (char*)setup_malloc(f, sizeof(char) * (len+1));` and `f->comment_list[i] = (char*)setup_malloc(f, sizeof(char) * (len+1));`. This issue may lead to code execution.
Language: C
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Out-of-bounds Write
CWE-787Top Fix
Upgrade Version
Upgrade to version miniaudio-sys - no_fix;stb-sys - no_fix;synthizer-sys - no_fix;vuk - no_fix;fluidlite-sys - 0.2.1;om-fork-ep-miniaudio-sys - no_fix;raylib-sys - 5.5.0;rustyray-sys - no_fix;raylib-ffi - no_fix;webots-bindings - no_fix;ep-miniaudio-sys - no_fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


