In Lizard v1.0 and LZ5 v2.0 (the prior release, before the product was renamed), there is an unchecked buffer size during a memcpy in the Lizard_decompress_LIZv1 function (lib/lizard_decompress_liz.h). Remote attackers can leverage this vulnerability to cause a denial of service via a crafted input file, as well as achieve remote code execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-3527 In Lizard v1.0 and LZ5 v2.0 (the prior release, before the product was renamed), there is an unchecked buffer size during a memcpy in the Lizard_decompress_LIZv1 function (lib/lizard_decompress_liz.h). Remote attackers can leverage this vulnerability to cause a denial of service via a crafted input file, as well as achieve remote code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:10:14.550Z

Reserved: 2018-05-26T00:00:00

Link: CVE-2018-11498

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-26T20:29:00.357

Modified: 2024-11-21T03:43:29.470

Link: CVE-2018-11498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses