CVE-2018-1000223Improper Restriction of Operations within the Bounds of a Memory Buffer in Soundtouch

Severity
8.8HIGHNVD
OSV5.5
EPSS
0.7%
top 27.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 20
Latest updateMay 14

Description

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

debiandebian/soundtouch< soundtouch 2.1.2+ds1-1 (bookworm)
Debiansurina/soundtouch< 2.1.2+ds1-1+3
Ubuntusurina/soundtouch< 1.7.1-5ubuntu0.1~esm1+2

🔴Vulnerability Details

3
GHSA
GHSA-63pm-cg8g-8gfx: soundtouch version up to and including 22022-05-14
OSV
soundtouch vulnerabilities2021-03-15
OSV
CVE-2018-1000223: soundtouch version up to and including 22018-08-20

📋Vendor Advisories

3
Ubuntu
SoundTouch vulnerabilities2021-03-15
Red Hat
soundtouch: Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() potentially leading to code execution2018-07-13
Debian
CVE-2018-1000223: soundtouch - soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerab...2018

💬Community

3
Bugzilla
CVE-2018-1000223 soundtouch: Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() potentially leading to code execution [epel-6]2018-07-27
Bugzilla
CVE-2018-1000223 soundtouch: Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() potentially leading to code execution [fedora-all]2018-07-27
Bugzilla
CVE-2018-1000223 soundtouch: Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() potentially leading to code execution2018-07-27