First published: Wed Apr 24 2019(Updated: )
WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/wavpack | <5.1.0-2ubuntu1.3 | 5.1.0-2ubuntu1.3 |
ubuntu/wavpack | <5.1.0-4ubuntu0.2 | 5.1.0-4ubuntu0.2 |
ubuntu/wavpack | <5.1.0-5ubuntu0.1 | 5.1.0-5ubuntu0.1 |
debian/wavpack | 5.4.0-1 5.6.0-1 5.7.0-1 | |
libwavpack1 | <=5.1.0 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
Fedora | =29 | |
Fedora | =30 | |
Fedora | =31 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11498 has a severity rating that indicates it can cause a denial of service due to an application crash.
To fix CVE-2019-11498, update WavPack to version 5.1.0-2ubuntu1.3 or later for Ubuntu or to version 5.4.0-1 or later for Debian.
CVE-2019-11498 affects WavPack versions up to 5.1.0, including specific versions in Ubuntu and Debian distributions.
CVE-2019-11498 could potentially be exploited by an attacker through a specially crafted DFF file.
If you are using an affected version of WavPack, you should immediately update to the fixed versions to prevent possible denial of service.