First published: Sat Jul 28 2018(Updated: )
An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. A maliciously crafted KWAJ file header extensions could cause a one or two byte overwrite. References: <a href="http://openwall.com/lists/oss-security/2018/07/28/1">http://openwall.com/lists/oss-security/2018/07/28/1</a> <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904799">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904799</a> Upstream patch: <a href="https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8">https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cabextract Libmspack | =0.0.20060920-alpha | |
Cabextract Libmspack | =0.3-alpha | |
Cabextract Libmspack | =0.4-alpha | |
Cabextract Libmspack | =0.5-alpha | |
Cabextract Libmspack | =0.6-alpha | |
Cabextract Project Cabextract | <=1.5 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Ansible Tower | =3.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/libmspack | <0.7 | 0.7 |
debian/libmspack | 0.10.1-2 0.11-1 0.11-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14681 is a vulnerability in libmspack before version 0.7alpha that can be exploited through bad KWAJ file header extensions, resulting in a one or two byte overwrite.
The severity of CVE-2018-14681 is high, with a severity value of 8.8.
CVE-2018-14681 affects libmspack versions before 0.7alpha.
To fix CVE-2018-14681, upgrade to libmspack version 0.7alpha or later.
More information about CVE-2018-14681 can be found at the following references: [1](http://www.openwall.com/lists/oss-security/2018/07/26/1), [2](http://www.securitytracker.com/id/1041410), [3](https://access.redhat.com/errata/RHSA-2018:3327)