First published: Sun Feb 04 2018(Updated: )
The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/wavpack | <5.1.0-2ubuntu0.2 | 5.1.0-2ubuntu0.2 |
debian/wavpack | 5.4.0-1 5.6.0-1 5.7.0-1 | |
libwavpack1 | =5.1.0 | |
Debian | =9.0 | |
Ubuntu | =17.10 | |
Wavpack | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7253 has a medium severity level as it allows for a denial-of-service due to a heap-based buffer over-read.
The recommended fix for CVE-2018-7253 is to upgrade to WavPack version 5.1.0-2ubuntu0.2 for Ubuntu or versions 5.4.0-1, 5.6.0-1, or 5.7.0-1 for Debian.
CVE-2018-7253 is related to denial-of-service vulnerabilities specifically involving buffer over-reads and possible heap overwrites.
Vulnerable versions to CVE-2018-7253 include WavPack 5.1.0 and specific versions of WavPack in Debian and Ubuntu.
Yes, CVE-2018-7253 can be exploited remotely by attackers using maliciously crafted DSDIFF files.