First published: Mon Apr 30 2018(Updated: )
Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to execute arbitrary code or cause a denial of service. (CVE-2018-10536, CVE-2018-10537) Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to cause a denial of service. (CVE-2018-10538, CVE-2018-10539, CVE-2018-10540)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/wavpack | <5.1.0-2ubuntu1.1 | 5.1.0-2ubuntu1.1 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/wavpack | <5.1.0-2ubuntu0.3 | 5.1.0-2ubuntu0.3 |
Ubuntu OpenSSH Client | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3637-1 is classified as high due to the potential for remote code execution and denial of service.
To fix USN-3637-1, update the wavpack package to version 5.1.0-2ubuntu1.1 for Ubuntu 18.04 or 5.1.0-2ubuntu0.3 for Ubuntu 17.10.
USN-3637-1 affects wavpack versions up to 5.1.0-2ubuntu1.1 on Ubuntu 18.04 and 5.1.0-2ubuntu0.3 on Ubuntu 17.10.
USN-3637-1 identifies a vulnerability in wavpack that incorrectly handles certain .wav files, leading to arbitrary code execution.
The vulnerability in USN-3637-1 was discovered by Thuan Pham, Marcel Böhme, Andrew Santosa, and Alexandru Razvan Caciulescu.