An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4197-1 | wavpack security updaze |
EUVD |
EUVD-2018-2611 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation. |
Ubuntu USN |
USN-3637-1 | WavPack vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:39:07.850Z
Reserved: 2018-04-29T00:00:00
Link: CVE-2018-10539
No data.
Status : Modified
Published: 2018-04-29T15:29:00.570
Modified: 2024-11-21T03:41:31.570
Link: CVE-2018-10539
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN