CVE-2018-1000223

soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
VendorProductVersion
surinasoundtouch
𝑥
≤ 2.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
soundtouch
bullseye
2.2+ds1-2
fixed
stretch
no-dsa
jessie
no-dsa
bookworm
2.3.2+ds1-1
fixed
sid
2.3.3+ds-1
fixed
trixie
2.3.3+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
soundtouch
lunar
Fixed 2.1.2+ds1-1
released
kinetic
Fixed 2.1.2+ds1-1
released
jammy
Fixed 2.1.2+ds1-1
released
impish
Fixed 2.1.2+ds1-1
released
hirsute
Fixed 2.1.2+ds1-1
released
groovy
Fixed 2.1.2+ds1-1
released
focal
Fixed 2.1.2+ds1-1
released
eoan
Fixed 2.1.2+ds1-1
released
disco
Fixed 2.1.2+ds1-1
released
cosmic
ignored
bionic
Fixed 1.9.2-3ubuntu0.1~esm1
released
xenial
Fixed 1.9.2-2+deb9u1ubuntu0.1~esm1
released
trusty
Fixed 1.7.1-5ubuntu0.1~esm1
released