
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-45676 affects stb_vorbis, a single file MIT licensed library for processing ogg vorbis files. The vulnerability was discovered in version 1.22 and disclosed on October 20, 2023. The issue exists in the setup_malloc function where an integer overflow vulnerability can lead to out-of-bounds write operations (GitHub Security Lab, NVD).
The vulnerability stems from an integer overflow in the setup_malloc function. When processing a sufficiently large value in the variable 'sz', an overflow occurs during the operation 'sz+7', which then results in a negative value. This negative value bypasses the maximum available memory buffer check, leading to potential out-of-bounds write operations. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
The vulnerability can be exploited to achieve code execution through out-of-bounds write operations. This could potentially allow attackers to execute arbitrary code in the context of the application using the affected library (GitHub Security Lab).
The vulnerability affects multiple versions of the software, including those packaged in various Linux distributions. Updates are being processed through distribution channels, as evidenced by the openSUSE Build Service update which addresses this CVE along with others (Build Service).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."