First published: Sat Jul 28 2018(Updated: )
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash) References: <a href="http://openwall.com/lists/oss-security/2018/07/28/1">http://openwall.com/lists/oss-security/2018/07/28/1</a> <a href="https://bugs.debian.org/904802">https://bugs.debian.org/904802</a> Upstream patch: <a href="https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a">https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cabextract Libmspack | =0.0.20060920-alpha | |
Cabextract Libmspack | =0.3-alpha | |
Cabextract Libmspack | =0.4-alpha | |
Cabextract Libmspack | =0.5-alpha | |
Cabextract Libmspack | =0.6-alpha | |
Cabextract Project Cabextract | <=1.5 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Ansible Tower | =3.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/libmspack | <0.7 | 0.7 |
debian/libmspack | 0.10.1-2 0.11-1 0.11-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14679 is a vulnerability in libmspack, which could lead to denial of service and application crash.
CVE-2018-14679 has a severity level of high.
CVE-2018-14679 affects the libmspack package in versions before 0.7alpha on Debian, Redhat, and Ubuntu.
To fix CVE-2018-14679, update to the recommended versions of the libmspack package on your operating system.
You can find more information about CVE-2018-14679 on the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2018/07/26/1), [Reference 2](http://www.securitytracker.com/id/1041410), [Reference 3](https://access.redhat.com/errata/RHSA-2018:3327).