Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that can result in memory corruption, denial of service, comprised execution of host program. This attack appear to be exploitable via Victim must open a specially crafted Ogg Vorbis file. This vulnerability appears to have been fixed in 1.13.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-1811 Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that can result in memory corruption, denial of service, comprised execution of host program. This attack appear to be exploitable via Victim must open a specially crafted Ogg Vorbis file. This vulnerability appears to have been fixed in 1.13.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T12:33:48.843Z

Reserved: 2018-02-05T00:00:00

Link: CVE-2018-1000050

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-02-09T23:29:01.743

Modified: 2024-11-21T03:39:31.687

Link: CVE-2018-1000050

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.