CVE-2018-10540

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-10540
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-10540.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-10540
Related
Published
2018-04-29T15:29:00Z
Modified
2024-09-18T02:54:23.201193Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytestocopy calculation and subsequent malloc call, leading to insufficient memory allocation.

References

Affected packages

Debian:11 / wavpack

Package

Name
wavpack
Purl
pkg:deb/debian/wavpack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / wavpack

Package

Name
wavpack
Purl
pkg:deb/debian/wavpack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / wavpack

Package

Name
wavpack
Purl
pkg:deb/debian/wavpack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/dbry/wavpack

Affected ranges

Type
GIT
Repo
https://github.com/dbry/wavpack
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

4.*

4.70.0
4.70.0-rc
4.75.0
4.75.0-rc
4.75.2
4.80.0
4.80.0-rc

5.*

5.0.0
5.0.0-alpha
5.0.0-alpha2
5.0.0-alpha3
5.0.0-alpha4
5.0.0-alpha5
5.1.0