In the startread function in xa.c in Sound eXchange (SoX) through 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a denial-of-service.
References
Link | Resource |
---|---|
https://public-inbox.org/sox-devel/20171109114554.16297-1-mans@mansr.com/raw | Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881121 | Exploit Issue Tracking Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00042.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2283 | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUKFZQSZG2ABMTAMOGBMY7MJNSGEIYTL/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62RARFRXGKPNNFFNVDV7DHJSOKAIZ3CX/ |
Information
Published : 2018-02-15 02:29
Updated : 2021-06-24 08:16
NVD link : CVE-2017-18189
Mitre link : CVE-2017-18189
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
debian
- debian_linux
sound_exchange_project
- sound_exchange