![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-34432 – Heap-buffer-overflow in src/formats_i.c
https://notcve.org/view.php?id=CVE-2023-34432
10 Jul 2023 — A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure. • https://access.redhat.com/security/cve/CVE-2023-34432 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-1010004
https://notcve.org/view.php?id=CVE-2019-1010004
15 Jul 2019 — SoX - Sound eXchange 14.4.2 and earlier is affected by: Out-of-bounds Read. The impact is: Denial of Service. The component is: read_samples function at xa.c:219. The attack vector is: Victim must open specially crafted .xa file. NOTE: this may overlap CVE-2017-18189. • https://sourceforge.net/p/sox/bugs/299 • CWE-125: Out-of-bounds Read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-13590 – Ubuntu Security Notice USN-5904-1
https://notcve.org/view.php?id=CVE-2019-13590
14 Jul 2019 — An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c. Se detecto un problema en ibsox.a en SoX versión 14.4.2. En sox-fmt.h (función startread), hay un desbordamiento de enteros en el res... • https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html • CWE-190: Integer Overflow or Wraparound CWE-476: NULL Pointer Dereference •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-8355 – Ubuntu Security Notice USN-4079-2
https://notcve.org/view.php?id=CVE-2019-8355
15 Feb 2019 — An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c. Se ha descubierto un problema en SoX 14.4.2. En xmalloc.h, hay un desbordamiento de enteros en el resultado de la multiplicación que se proporciona a la macro lsx_valloc que envuelve a malloc. • https://lists.debian.org/debian-lts-announce/2019/05/msg00040.html • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-8356 – Ubuntu Security Notice USN-4079-1
https://notcve.org/view.php?id=CVE-2019-8356
15 Feb 2019 — An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow. Se ha descubierto un problema en SoX 14.4.2. Uno de los argumentos para bitrv2 en fft4g.c no está protegido, por lo que puede conducir a un acceso de escritura fuera del array declarado estáticamente. Esto también se conoce como desbordamiento de búfer basado en pila. • https://lists.debian.org/debian-lts-announce/2019/05/msg00040.html • CWE-129: Improper Validation of Array Index CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-8357
https://notcve.org/view.php?id=CVE-2019-8357
15 Feb 2019 — An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference. Se ha descubierto un problema en SoX 14.4.2. lsx_make_lpf en effect_i_dsp.c permite una desreferencia de puntero NULL. • https://lists.debian.org/debian-lts-announce/2019/05/msg00040.html • CWE-476: NULL Pointer Dereference •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-8354 – Ubuntu Security Notice USN-4079-2
https://notcve.org/view.php?id=CVE-2019-8354
15 Feb 2019 — An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow. Se ha descubierto un problema en SoX 14.4.2. lsx_make_lpf en effect_i_dsp.c tiene un desbordamiento de enteros en el resultado de la multiplicación que se proporciona a malloc. Cuando el búfer se asigna, es más pequeño de lo esperado, lo que conduce a un desbordamiento... • https://lists.debian.org/debian-lts-announce/2019/05/msg00040.html • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-18189 – sox: NULL pointer dereference in startread function in xa.c
https://notcve.org/view.php?id=CVE-2017-18189
15 Feb 2018 — In the startread function in xa.c in Sound eXchange (SoX) through 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a denial-of-service. En la función startread en xa.c en Sound eXchange (SoX) hasta la versión 14.4.2, una cabecera que especifica cero canales desencadena un bucle infinito con una desreferencia de puntero NULL resultante, lo que podría permitir que un atacante remoto provoque una de... • https://access.redhat.com/errata/RHSA-2019:2283 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-476: NULL Pointer Dereference •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-15642 – Gentoo Linux Security Advisory 201810-02
https://notcve.org/view.php?id=CVE-2017-15642
19 Oct 2017 — In lsx_aiffstartread in aiff.c in Sound eXchange (SoX) 14.4.2, there is a Use-After-Free vulnerability triggered by supplying a malformed AIFF file. En lsx_aiffstartread en aiff.c en Sound eXchange (SoX), versión 14.4.2, hay una vulnerabilidad de uso de memoria previamente liberada, desencadenada mediante un archivo AIFF mal formado. Multiple vulnerabilities have been found in SoX, the worst of which may lead to a Denial of Service condition. Versions less than 14.4.2-r1 are affected. • https://lists.debian.org/debian-lts-announce/2017/11/msg00043.html • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-15370 – Gentoo Linux Security Advisory 201810-02
https://notcve.org/view.php?id=CVE-2017-15370
16 Oct 2017 — There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file. Existe un desbordamiento de búfer basado en memoria dinámica (heap) en la función ImaExpandS de ima_rw.c en la versión 14.4.2 de Sound eXchange (SoX). Se podría realizar un ataque de denegación de servicio con unos valores de entrada especialmente manipulados durante la conversión de un archivo de audio. Multi... • https://bugzilla.redhat.com/show_bug.cgi?id=1500554 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •