In the startread function in xa.c in Sound eXchange (SoX) through 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a denial-of-service.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://public-inbox.org/sox-devel/20171109114554.16297-1-mans%40mansr.com/raw | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881121 | mailing list exploit third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2019/02/msg00042.html | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2019:2283 | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUKFZQSZG2ABMTAMOGBMY7MJNSGEIYTL/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62RARFRXGKPNNFFNVDV7DHJSOKAIZ3CX/ | vendor advisory |