Description
An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4197-1 | wavpack security updaze |
EUVD |
EUVD-2018-2612 | An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation. |
Ubuntu USN |
USN-3637-1 | WavPack vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:39:07.998Z
Reserved: 2018-04-29T00:00:00.000Z
Link: CVE-2018-10540
No data.
Status : Modified
Published: 2018-04-29T15:29:00.647
Modified: 2024-11-21T03:41:31.740
Link: CVE-2018-10540
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN