First published: Sat Feb 03 2018(Updated: )
A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wavpack | 5.4.0-1 5.6.0-1 5.7.0-1 | |
ubuntu/wavpack | <5.1.0-2ubuntu0.1 | 5.1.0-2ubuntu0.1 |
libwavpack1 | =5.1.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6767 has been rated as a security vulnerability that can lead to denial-of-service attacks.
To fix CVE-2018-6767, update WavPack to version 5.4.0-1 or higher, or apply the relevant patches from your OS vendor.
CVE-2018-6767 affects WavPack version 5.1.0 and earlier versions on various platforms.
Yes, CVE-2018-6767 can be exploited remotely through a maliciously crafted RF64 file.
CVE-2018-6767 can cause a denial-of-service attack, potentially leading to application crashes or unresponsiveness.