CVE-2018-1000223

EUVD-2018-1893
soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 77%
Affected Products (NVD)
VendorProductVersion
surinasoundtouch
𝑥
≤ 2.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
soundtouch
bookworm
2.3.2+ds1-1
fixed
bullseye
2.2+ds1-2
fixed
jessie
no-dsa
sid
2.3.3+ds-1
fixed
stretch
no-dsa
trixie
2.3.3+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
soundtouch
bionic
Fixed 1.9.2-3ubuntu0.1~esm1
released
cosmic
ignored
disco
Fixed 2.1.2+ds1-1
released
eoan
Fixed 2.1.2+ds1-1
released
focal
Fixed 2.1.2+ds1-1
released
groovy
Fixed 2.1.2+ds1-1
released
hirsute
Fixed 2.1.2+ds1-1
released
impish
Fixed 2.1.2+ds1-1
released
jammy
Fixed 2.1.2+ds1-1
released
kinetic
Fixed 2.1.2+ds1-1
released
lunar
Fixed 2.1.2+ds1-1
released
trusty
Fixed 1.7.1-5ubuntu0.1~esm1
released
xenial
Fixed 1.9.2-2+deb9u1ubuntu0.1~esm1
released