A heap buffer overflow in the start_decoder function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service or execute arbitrary code by opening a crafted Ogg Vorbis file.
References
Link | Resource |
---|---|
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Patch Third Party Advisory |
http://nothings.org/stb_vorbis/ | Third Party Advisory |
https://github.com/nothings/stb/commits/master/stb_vorbis.c | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html | Mailing List Third Party Advisory |
Information
Published : 2019-08-15 10:15
Updated : 2023-02-02 10:32
NVD link : CVE-2019-13217
Mitre link : CVE-2019-13217
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
stb_vorbis_project
- stb_vorbis