A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References
Configurations
History
24 Jun 2025, 19:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 - Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5356 - | |
References | () http://www.openwall.com/lists/oss-security/2023/02/03/3 - | |
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html - | |
First Time |
Sound Exchange Project
Sound Exchange Project sound Exchange |
|
CPE | cpe:2.3:a:sound_exchange_project:sound_exchange:14.4.2:*:*:*:*:*:*:* |
Information
Published : 2022-04-14 20:15
Updated : 2025-06-24 19:34
NVD link : CVE-2021-40426
Mitre link : CVE-2021-40426
JSON object : View
Products Affected
sound_exchange_project
- sound_exchange
CWE
CWE-122
Heap-based Buffer Overflow