
Cloud Vulnerability DB
A community-led vulnerabilities database
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of buffer write in start_decoder because at maximum m->submaps can be 16 but submap_floor and submap_residue are declared as arrays of 15 elements. This vulnerability was assigned CVE-2023-45678 and was discovered in October 2023 (NVD, GitHub Security Lab).
The vulnerability exists in the stb_vorbis library version 1.22 and affects the start_decoder function. The root cause is a buffer overflow condition where the maximum value for m->submaps can be 16, but the corresponding arrays submap_floor and submap_residue are only declared with 15 elements. This mismatch in array sizes leads to an out-of-bounds write vulnerability. The issue has been assigned a CVSS v3.1 Base Score of 7.8 HIGH with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
The vulnerability can lead to code execution when exploited successfully. The out-of-bounds write condition could allow an attacker to manipulate memory outside the intended buffer boundaries, potentially leading to arbitrary code execution (GitHub Security Lab).
The vulnerability affects multiple versions of the Debian distribution including bullseye, bookworm, sid, and trixie. Currently, these versions remain vulnerable with no immediate fix available. Users are advised to exercise caution when processing untrusted ogg vorbis files until a patch is released (Debian Security Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."