
Cloud Vulnerability DB
A community-led vulnerabilities database
An integer overflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). The vulnerability was discovered by Lilith >_> of Cisco Talos and was disclosed on February 20, 2024. The affected software is an open-source library designed to process various types of medical signal data (EKG, EEG, etc) within different file formats (Talos Report).
The vulnerability occurs in the sopen_FAMOS_read function where a specially crafted .famos file can lead to an out-of-bounds write. The issue stems from an integer overflow that occurs when processing certain file structures, which can then be leveraged to cause memory corruption. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified as CWE-190 (Integer Overflow or Wraparound) (Talos Report).
If successfully exploited, this vulnerability can lead to arbitrary code execution on the targeted system. Given that the software is used in processing medical signal data, this could potentially impact medical facilities and research institutions that rely on this library for analyzing patient data (Talos Report).
The vulnerability has been addressed in version 2.6.0 of the software where FAMOS support is disabled by default and can only be enabled by setting BIOSIG_FAMOS_TRUST_INPUT=1. Users are advised to update to this version to mitigate the vulnerability (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."