The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
References
Link | Resource |
---|---|
https://github.com/dbry/WavPack/issues/28 | Exploit Third Party Advisory |
https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec | Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559 | Mailing List Issue Tracking Third Party Advisory |
https://www.debian.org/security/2018/dsa-4125 | Third Party Advisory |
https://usn.ubuntu.com/3578-1/ | Third Party Advisory |
https://seclists.org/bugtraq/2019/Dec/37 | |
http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html |
Information
Published : 2018-02-19 15:29
Updated : 2019-12-20 02:15
NVD link : CVE-2018-7253
Mitre link : CVE-2018-7253
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
wavpack
- wavpack