A vulnerability in the WavInFile::readHeaderBlock() function of SoundTouch could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
The vulnerability exists in the WavInFile::readHeaderBlock() function, as defined in the SoundStretch/WavFile.cpp file of the affected software, and is due to the use of a signed integer instead of an unsigned integer when the size of a structure is calculated. An attacker could exploit this vulnerability by persuading a user to open a file with the SoundStretch utility that submits malicious input to the targeted system. A successful exploit could trigger a heap-based buffer overflow condition that the attacker could use to execute arbitrary code on the system.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.
SoundTouch has confirmed the vulnerability and released software updates.