CVE-2014-8145

Multiple heap-based buffer overflows in Sound eXchange (SoX) 14.4.1 and earlier allow remote attackers to have unspecified impact via a crafted WAV file to the (1) start_read or (2) AdpcmReadBlock function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
sound_exchange_projectsound_exchange
𝑥
≤ 14.4.1
debiandebian_linux
7.0
debiandebian_linux
8.0
oraclesolaris
11.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sox
bullseye (security)
14.4.2+git20190427-2+deb11u2
fixed
bullseye
14.4.2+git20190427-2+deb11u2
fixed
bookworm
14.4.2+git20190427-3.5
fixed
sid
14.4.2+git20190427-5
fixed
trixie
14.4.2+git20190427-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sox
cosmic
not-affected
bionic
not-affected
artful
not-affected
zesty
not-affected
yakkety
not-affected
xenial
Fixed 14.4.1-5ubuntu0.1
released
wily
not-affected
vivid
not-affected
utopic
ignored
trusty
Fixed 14.4.1-3ubuntu1.1
released
precise
ignored
lucid
ignored