Vulnerability Details : CVE-2022-33065
Potential exploit
Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2022-33065
- cpe:2.3:a:libsndfile_project:libsndfile:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-33065
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-33065
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-33065
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-33065
-
https://github.com/libsndfile/libsndfile/issues/833
UndefinedBehaviorSanitizer: multiple signed integer overflow · Issue #833 · libsndfile/libsndfile · GitHubExploit;Issue Tracking
-
https://github.com/libsndfile/libsndfile/issues/789
Signed integer overflow in src/mat4.c:323 · Issue #789 · libsndfile/libsndfile · GitHubIssue Tracking
Jump to