First published: Tue Mar 14 2017(Updated: )
The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavpack Project Wavpack | <=5.0.0 | |
ubuntu/wavpack | <4.70.0-1ubuntu0.1 | 4.70.0-1ubuntu0.1 |
ubuntu/wavpack | <5.0.0-2<5.1.0 | 5.0.0-2 5.1.0 |
ubuntu/wavpack | <4.75.2-2ubuntu0.1 | 4.75.2-2ubuntu0.1 |
debian/wavpack | 5.4.0-1 5.6.0-1 5.7.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10169 has been assessed as having a moderate severity level due to the potential for denial of service through out-of-bounds reads.
To fix CVE-2016-10169, update Wavpack to version 5.1.0 or later, which addresses the vulnerability.
Wavpack versions prior to 5.1.0 are affected by CVE-2016-10169 and should be updated.
CVE-2016-10169 allows remote attackers to perform a denial of service attack through crafted WV files.
CVE-2016-10169 affects Wavpack across multiple operating systems, including certain versions in Ubuntu and Debian.