First published: Sat Feb 03 2018(Updated: )
The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/wavpack | <5.1.0-2ubuntu0.2 | 5.1.0-2ubuntu0.2 |
debian/wavpack | 5.4.0-1 5.6.0-1 5.7.0-1 | |
libwavpack1 | =5.1.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7254 has been classified as a vulnerability that can lead to denial-of-service and potential buffer overflow issues.
To remediate CVE-2018-7254, upgrade WavPack to version 5.1.0-2ubuntu0.2 or later for Ubuntu, or to version 5.4.0-1, 5.6.0-1, or 5.7.0-1 for Debian.
CVE-2018-7254 affects WavPack 5.1.0 on Ubuntu and multiple versions of WavPack on Debian systems.
While CVE-2018-7254 primarily causes denial-of-service, it may indirectly result in data loss under certain exploit scenarios.
The vulnerability CVE-2018-7254 can be exploited by a remote attacker using a crafted CAF file.