Vulnerability Description
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sound Exchange Project | Sound Exchange | 14.4.2 |
Related Weaknesses (CWE)
References
- https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html
- https://sourceforge.net/p/sox/bugs/325/ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html
- https://sourceforge.net/p/sox/bugs/325/ExploitThird Party Advisory
FAQ
What is CVE-2019-13590?
CVE-2019-13590 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro tha...
How severe is CVE-2019-13590?
CVE-2019-13590 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-13590?
Check the references section above for vendor advisories and patch information. Affected products include: Sound Exchange Project Sound Exchange.