Bug 1192597 - (CVE-2020-23904) VUL-1: CVE-2020-23904: speex: A stack buffer overflow in speexenc.c of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file.
(CVE-2020-23904)
VUL-1: CVE-2020-23904: speex: A stack buffer overflow in speexenc.c of Speex ...
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/314758/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-11-11 15:42 UTC by Carlos López
Modified: 2022-02-10 16:31 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2021-11-11 15:42:18 UTC
CVE-2020-23904

A stack buffer overflow in speexenc.c of Speex v1.2 allows attackers to cause a
denial of service (DoS) via a crafted WAV file.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23904
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23904
https://github.com/xiph/speex/issues/14
Comment 1 Carlos López 2021-11-11 15:43:17 UTC
There is no patch yet for this vulnerability.
Comment 2 Takashi Iwai 2021-11-11 15:58:18 UTC
And the bug can't be reproduced with the given sample...

%  speexenc sample2 out.spx
Corrupted header: ByteRate mismatch
Comment 4 Takashi Iwai 2022-01-24 13:55:56 UTC
I reassign back to security team.  Feel free to close :)
Comment 5 Carlos López 2022-02-10 16:31:09 UTC
Closing, as the bug cannot be reproduced.