
Cloud Vulnerability DB
A community-led vulnerabilities database
An out-of-bounds write vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. The vulnerability was discovered by Lilith >_> of Cisco Talos and assigned CVE-2024-23606 with a CVSS score of 9.8 (Talos Report).
The vulnerability occurs in the sopen_FAMOS_read function where the hdr->CHANNEL buffer can be allocated with calloc(0x0,sizeof(CHANNEL_TYPE)). When processing certain FAMOS file opcodes like 'Cb,1' and 'CR,1', which have no state machine requirements, writes to hdr->CHANNEL[CHAN].bi can occur before the buffer is properly sized, leading to out-of-bounds writes. This happens because these opcodes can be processed before the hdr->CHANNEL buffer is reallocated to an appropriate size (Talos Report).
The vulnerability allows attackers to potentially execute arbitrary code on the targeted system by providing a specially crafted FAMOS file. Given the library's use in processing medical signal data (EKG, EEG, etc.) and its integration with various scientific software, successful exploitation could compromise sensitive medical data processing systems (Talos Report).
The vulnerability has been patched in version 2.6.0 of the software. In this version, FAMOS support is disabled by default and can only be enabled by setting BIOSIG_FAMOS_TRUST_INPUT=1 to mitigate the vulnerability (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."