
Cloud Vulnerability DB
A community-led vulnerabilities database
Miniaudio 0.10.35 has an integer-based buffer overflow vulnerability caused by an out-of-bounds left shift in the drwavbytesto_u32 function in miniaudio.h. The vulnerability was discovered and disclosed on June 25, 2021 (NVD, AttackerKB).
The vulnerability exists in the drwavbytesto_u32 function within miniaudio.h, where an out-of-bounds left shift operation can trigger a buffer overflow. The specific issue occurs when performing a left shift of 128 by 24 places, which cannot be properly represented in the integer type, leading to undefined behavior (GitHub Issue). The vulnerability has been assigned a CVSS score of 6.8, indicating a medium to high severity level (CISA).
A successful exploitation of this vulnerability could lead to buffer overflow conditions, potentially resulting in memory corruption and undefined behavior in applications using the affected versions of miniaudio. This could affect the stability and security of applications implementing the library (NVD).
Users should upgrade to a version newer than 0.10.35 where this vulnerability has been addressed. For those unable to upgrade immediately, implementing input validation before passing data to the drwavbytesto_u32 function could help mitigate the risk (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."