7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.7%
libstb.so is vulnerable to Double Free. The vulnerability is due to start_decoder
function in stb_vorbis.c
file does not initialize the memory allocated for f->comment_list
. This allows an attacker to craft a file that triggers an early return in the function, leading to setup_free
being called on these uninitialized pointers, which could result in memory corruption or code execution.
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3660-L3677
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L4208-L4215
github.com/nothings/stb/pull/1557
github.com/nothings/stb/pull/1557/commits/15a7991b925fcfaddbb0b8fdb29d51bbd77c2cf9
securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.7%