{"id":"CVE-2021-3246","details":"A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file.","modified":"2026-03-15T22:40:40.193677Z","published":"2021-07-20T15:15:11.053Z","related":["ALSA-2021:3253","MGASA-2021-0392","SUSE-SU-2021:14769-1","SUSE-SU-2021:2615-1","SUSE-SU-2021:2764-1","openSUSE-SU-2021:1166-1","openSUSE-SU-2021:2764-1","openSUSE-SU-2024:10992-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLUDCEMMPRA3IYYYHVZUOUZXI65FU37V/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7LNW4AVDVL3BU3N3KGVFLTYFASBVCIF/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-11"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4947"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00024.html"},{"type":"FIX","url":"https://github.com/libsndfile/libsndfile/issues/687"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/erikd/libsndfile","events":[{"introduced":"0"},{"last_affected":"68958f9c9199dad97dcd10700df3746b2cd9b8a3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.30"}]}}],"versions":["1.0.25","1.0.26","1.0.27","1.0.28","v1.0.29","v1.0.30"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3246.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}