soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
References
Link | Resource |
---|---|
https://gitlab.com/soundtouch/soundtouch/issues/6 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:59
Updated: 2022-10-03T16:21:59
Reserved: 2018-08-01T00:00:00
Link: CVE-2018-1000223
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-08-20T20:29:01.470
Modified: 2018-10-15T16:17:17.100
Link: CVE-2018-1000223
JSON object: View
Redhat Information
No data.
CWE