Impact
The vulnerability lies in the setup_free function of stb_vorbis.c in Nothings stb up to version 1.22. An attacker can manipulate data to trigger allocation of resources, leading to uncontrolled resource consumption. This can potentially cause a denial of service, as the application may exhaust memory or other resources required for normal operation.
Affected Systems
Systems using the Nothings stb library, specifically releases up to and including version 1.22, are affected. No other versions are mentioned as vulnerable. The vulnerability was identified in the upstream source code used by developers embedding stb in their applications.
Risk and Exploitability
With a CVSS score of 5.3, the vulnerability is considered moderate in severity. The exploit is reported as publicly available and remote, though the EPSS score is not disclosed. Since the vendor did not respond to the disclosure, no official patch is currently available. Administrators should expect the risk of denial of service if an attacker can supply crafted data to the vulnerable function.
OpenCVE Enrichment