Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2019-8356
HistoryFeb 15, 2019 - 11:29 p.m.

CVE-2019-8356

2019-02-1523:29:00
Debian Security Bug Tracker
security-tracker.debian.org
13

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.3%

An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.

OSVersionArchitecturePackageVersionFilename
Debian12allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb
Debian11allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb
Debian10allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb
Debian999allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb
Debian13allsox< 14.4.2+git20190427-1sox_14.4.2+git20190427-1_all.deb

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.3%