Mandriva Linux Security Advisory 2015-015 - The sox command line tool is affected by two heap-based buffer overflows, respectively located in functions start_read() and AdpcmReadBlock(). A specially crafted wav file can be used to trigger the vulnerabilities.
05e2d5eccde0f99b9b7535011b4133c0ed51d18513c2cfd97fd85d1ac0504c1c
Debian Linux Security Advisory 3112-1 - Michele Spagnuolo of the Google Security Team discovered two heap-based buffer overflows in SoX, the Swiss Army knife of sound processing programs. A specially crafted wav file could cause an application using SoX to crash or, possibly, execute arbitrary code.
e522b182877461036a97d01f0b34ab4677e45c89f632e7073c9d575ceb4d440a
SoX versions 14.4.1 and below suffer from multiple heap-based buffer overflow vulnerabilities.
aeff85e5727326a30715ccc28a8c670697acdefdd8f05484570ea038725641a8