An issue in phiola/src/afilter/pcm_convert.h:513 of phiola v2.0-rc22 allows a remote attacker to execute arbitrary code via the a crafted .wav file.
[
{
"cpes": [
"cpe:2.3:a:stsaz:phiola:-:*:*:*:*:*:*:*"
],
"vendor": "stsaz",
"product": "phiola",
"versions": [
{
"status": "affected",
"version": "v2.0-rc22"
}
],
"defaultStatus": "unknown"
}
]
github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5
github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png
github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md
github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1
github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc
github.com/stsaz/phiola/
github.com/stsaz/phiola/issues/28