KissFFT Integer Overflow: Heap Corruption Risk in Signal Processing

KissFFT Integer Overflow: Heap Corruption Risk in Signal Processing

The National Vulnerability Database (NVD) has identified a critical integer overflow vulnerability, CVE-2026-41445, within the KissFFT library. This flaw resides in the kiss_fftndr_alloc() function in kiss_fftndr.c. An attacker can exploit this by crafting specific input dimensions that cause the calculation of the allocation size to exceed the limits of signed 32-bit integer arithmetic. This overflow leads to malloc() allocating a buffer smaller than intended. When kiss_fftndr() processes data using this undersized buffer, it can result in a heap buffer overflow, allowing malicious writes beyond the allocated memory region.

The CVSS score of 8.8 (HIGH) underscores the severity of this issue. The vector (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates a network-attackable vulnerability requiring user interaction, with a high impact on confidentiality, integrity, and availability. While specific affected products are not detailed by the NVD, any application or system that incorporates this version of KissFFT for its signal processing capabilities is potentially at risk.

Defenders should prioritize identifying and updating any instances of KissFFT where this vulnerability may be present. Given that the vulnerability can be triggered remotely with user interaction, patching or replacing vulnerable library versions is paramount. Organizations relying on third-party software that utilizes KissFFT should actively seek vendor advisories and apply updates promptly. The attacker’s calculus is simple: find an application using vulnerable KissFFT, craft malicious input, and trigger a crash or code execution.

What This Means For You

  • If your applications or systems utilize the KissFFT library for digital signal processing, you must audit your codebase and dependencies immediately. Prioritize updating to a version of KissFFT that addresses commit 8a8e66e or later to mitigate the risk of heap buffer overflow and potential remote code execution.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-41445 - KissFFT Integer Overflow Heap Corruption via Crafted Dimensions

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-41445 Buffer Overflow KissFFT before commit 8a8e66e
CVE-2026-41445 Integer Overflow kiss_fftndr_alloc() function in kiss_fftndr.c
CVE-2026-41445 Memory Corruption Allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit integer arithmetic
CVE-2026-41445 Heap Buffer Overflow Triggered by crafted dimensions causing multiplication to exceed INT_MAX
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 20, 2026 at 20:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-41389 — OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce

CVE-2026-41389 — OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce local-root containment on tool-result media paths, allowing arbitrary local and UNC file access. Attackers can...

vulnerabilityCVEmedium-severitycwe-73
/SCW Vulnerability Desk /MEDIUM /5.8 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-39112 — Cross Site Scripting vulnerability in Apartment Visitors

CVE-2026-39112 — Cross Site Scripting vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the visname parameter of visitors-form.php. An authenticated attacker...

vulnerabilityCVEmedium-severitycwe-79
/SCW Vulnerability Desk /MEDIUM /5.4 /⚑ 2 IOCs /⚙ 3 Sigma

Unauthenticated SQLi in Apartment Visitors Management System

CVE-2026-39111 — SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php)....

vulnerabilityCVEhigh-severitysql-injectioncwe-89
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 3 IOCs /⚙ 3 Sigma