CVE-2019-13590
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
Se detecto un problema en ibsox.a en SoX versión 14.4.2. En sox-fmt.h (función startread), hay un desbordamiento de enteros en el resultado de la suma de enteros (wraparound a 0) que se proporciona a la macro lsx_calloc que envuelve a malloc. Cuando se devuelve un puntero NULL, se usa sin una verificación previa de que es un puntero válido, lo que conduce a una desreferencia de puntero NULL en lsx_readbuf en format_i.c.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-07-14 CVE Reserved
- 2019-07-14 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
- CWE-476: NULL Pointer Dereference
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://sourceforge.net/p/sox/bugs/325 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sound Exchange Project Search vendor "Sound Exchange Project" | Sound Exchange Search vendor "Sound Exchange Project" for product "Sound Exchange" | 14.4.2 Search vendor "Sound Exchange Project" for product "Sound Exchange" and version "14.4.2" | - |
Affected
|