{"containers":{"cna":{"affected":[{"product":"SoX (Sound eXchange)","vendor":"n/a","versions":[{"status":"affected","version":"Not Known"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-120","description":"CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-25T19:36:27.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1975666"},{"tags":["x_refsource_MISC"],"url":"https://access.redhat.com/security/cve/CVE-2021-23172"},{"tags":["x_refsource_MISC"],"url":"https://sourceforge.net/p/sox/bugs/350/"},{"tags":["x_refsource_MISC"],"url":"https://security.archlinux.org/CVE-2021-23172"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:05:54.449Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1975666"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://access.redhat.com/security/cve/CVE-2021-23172"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://sourceforge.net/p/sox/bugs/350/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://security.archlinux.org/CVE-2021-23172"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2021-23172","datePublished":"2022-08-25T19:36:27.000Z","dateReserved":"2021-06-04T00:00:00.000Z","dateUpdated":"2024-08-03T19:05:54.449Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}