The vulnerability lies in the ASF file parsing logic within the file-type library. The provided commit patch clearly shows modifications to the core.js file, specifically within a loop that processes ASF file headers. The vulnerability description explains that a zero-size sub-header leads to a negative payload calculation, causing tokenizer.ignore() to move the stream position backward, resulting in an infinite loop. The patch mitigates this by adding a check to ensure the stream position always advances, breaking the loop if it does not. The affected code is located within the parse method of the FileTypeParser class, as identified by analyzing the structure of core.js. The test case added in test.js confirms the fix by using fileTypeFromBuffer, which internally uses the FileTypeParser.